-
1Academic Journal
المصدر: Computer Science Journal of Moldova, Vol 30, Iss 3(90), Pp 288-307 (2022)
مصطلحات موضوعية: malicious intrusions, anomaly detection, machine learning, deep learning, classification, iot dataset, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
Relation: http://www.math.md/files/csjm/v30-n3/v30-n3-(pp288-307).pdf; https://doaj.org/toc/1561-4042; https://doaj.org/toc/2587-4330
-
2Conference
المؤلفون: Nader, Patric, Honeine, Paul, Beauseroy, Pierre
المساهمون: Laboratoire Modélisation et Sûreté des Systèmes (LM2S), Institut Charles Delaunay (ICD), Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS)-Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS), ANR-11-SECU-0005,SCALA,Surveillance Continue d'Activité et Localisation d'Agression(2011)
المصدر: Proc. 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN) ; https://hal.science/hal-01965983 ; Proc. 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN), 2015, Bruges, Belgium. pp.567 - 572
مصطلحات موضوعية: one-class, cybersecurity, computer crime, critical infrastructures, firewalls, learning (artificial intelligence), pattern classification, principal component analysis, radial basis function networks, SCADA systems, support vector machines, lp-norms, information and communication technologies, supervisory control and data acquisition systems, cyberattacks heterogeneity, SCADA networks, systems vulnerabilities, intrusion detection systems, IDS, cyberattacks modeling, malicious intrusions detection, one-class classification algorithms, support vector data description, SVDD, kernel principle component analysis, radial basis function kernels, RBF kernels, bandwidth parameter, Kernel, Machine learning
Relation: hal-01965983; https://hal.science/hal-01965983; https://hal.science/hal-01965983/document; https://hal.science/hal-01965983/file/15.esann.oneclass.pdf
-
3Conference
المؤلفون: O'Mahony, George D., Harris, Philip J., Murphy, Colin C.
مصطلحات موضوعية: Distance measurement, Protocols, Telecommunication security, Wireless sensor networks, Zigbee, Potential detection technique, Malicious challenge, WSN, Spectrum use, Device errors, Realistic network model, Matched protocol interference, Time spectrum analyzer, XBee COTS devices, ISM band services, ZigBee cluster head network, Attack exploration, Protocol-specific structures, Malicious attack, Specific vulnerability, Intrusion detection, Safety critical services, Safety critical application, Malicious intrusions, Security challenge, Standardized protocols, Shelf devices, Wireless networks, Space-based applications, Malicious matched protocol attack
وصف الملف: application/pdf
Relation: https://ieeexplore.ieee.org/abstract/document/8585681; G. D. O' Mahony,P. J. Harris,C. C. Murphy (2018) Analyzing the Vulnerability of Wireless Sensor Networks to a Malicious Matched Protocol Attack 2018 International Carnahan Conference on Security Technology (ICCST) Montreal, QC, Canada, 22-25 October. doi:10.1109/CCST.2018.8585681; http://hdl.handle.net/10468/9536
-
4
المؤلفون: Colin C. Murphy, Philip J. Harris, George D. O'Mahony
المصدر: ICCST
مصطلحات موضوعية: 0209 industrial biotechnology, Mitigation, Computer science, Space-based applications, Interoperability, Space, 02 engineering and technology, Intrusion detection system, Malicious challenge, Spectrum use, ISM band services, 020901 industrial engineering & automation, 0202 electrical engineering, electronic engineering, information engineering, Protocol, Intrusion detection, Wireless networks, Protocol (object-oriented programming), Distance measurement, ISM band, Network model, Time spectrum analyzer, Distance, Wireless network, Intrusion, Standardized protocols, Specific vulnerability, Zigbee, Detection, Matched, Device errors, Malicious matched protocol attack, Safety, Attack style preys, Computer network, IoT, Protocol-specific structures, Attack exploration, Inter-Node, XBee COTS devices, Malicious attack, Telecommunication security, Safety critical application, Hardware, Potential detection technique, Matched protocol interference, Malicious intrusions, Spectrum, Safety critical services, PHY, Realistic network model, Shelf devices, business.industry, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Co-existence, 020206 networking & telecommunications, ZigBee cluster head network, Attack, WSN, WSN and ZigBee, Wireless sensor networks, Internet of Things (IoT), Security challenge, Security, business, Interference, Wireless sensor network, Commercial off-the-shelf, Protocols
وصف الملف: application/pdf
-
5
المؤلفون: Nader, Patric, Honeine, Paul, Beauseroy, Pierre
المساهمون: Laboratoire Modélisation et Sûreté des Systèmes (LM2S), Institut Charles Delaunay (ICD), Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS)-Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS)
المصدر: IEEE Transactions on Industrial Informatics
IEEE Transactions on Industrial Informatics, Institute of Electrical and Electronics Engineers, 2014, 10 (4), pp.2308-2317. ⟨10.1109/TII.2014.2330796⟩
IEEE Transactions on Industrial Informatics, 2014, 10 (4), pp.2308-2317. ⟨10.1109/TII.2014.2330796⟩مصطلحات موضوعية: Optimization, bandwidth parameter, lp-norms, cybersecurity, principal component analysis, systems vulnerabilities, malicious intrusions detection, IDS, SCADA systems, information and communication technologies, \mbi lₚ -norms, one-class, support vector machines, kernel methods, pattern classification, [INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG], [INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing, supervisory control and data acquisition systems, SVDD, Machine learning, cyberattacks heterogeneity, Intrusion detection, SCADA networks, critical infrastructures, cyberattacks modeling, radial basis function networks, firewalls, radial basis function kernels, one-class classification algorithms, one-class classification, supervisory control and data acquisition (SCADA) systems, Kernel, RBF kernels, intrusion detection systems, learning (artificial intelligence), computer crime, kernel principle component analysis, support vector data description, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
-
6
المؤلفون: Patrick Nader, Honeine, P., Beauseroy, P.
المساهمون: Laboratoire Modélisation et Sûreté des Systèmes (LM2S), Institut Charles Delaunay (ICD), Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS)-Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS), ANR-11-SECU-0005,SCALA,Surveillance Continue d'Activité et Localisation d'Agression(2011)
المصدر: Scopus-Elsevier
Proc. 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN)
Proc. 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN), 2015, Bruges, Belgium. pp.567-572مصطلحات موضوعية: bandwidth parameter, Optimization, lp-norms, cybersecurity, principal component analysis, systems vulnerabilities, malicious intrusions detection, SCADA systems, IDS, information and communication technologies, one-class, \mbi lₚ -norms, support vector machines, kernel methods, pattern classification, [INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG], [INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing, supervisory control and data acquisition systems, SVDD, Machine learning, cyberattacks heterogeneity, Intrusion detection, SCADA networks, critical infrastructures, cyberattacks modeling, radial basis function networks, firewalls, radial basis function kernels, [INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV], one-class classification algorithms, one-class classification, supervisory control and data acquisition (SCADA) systems, Kernel, ComputingMethodologies_PATTERNRECOGNITION, RBF kernels, intrusion detection systems, learning (artificial intelligence), computer crime, support vector data description, kernel principle component analysis, Mahalanobis distance, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing