CNN based method for the development of cyber-attacks detection algorithms in industrial control systems

被引:0
|
作者
Nedeljkovic, Dusan [1 ]
Jakovljevic, Zivana [1 ]
机构
[1] University of Belgrade, Faculty of Mechanical Engineering, Belgrade, Serbia
来源
Computers and Security | 2022年 / 114卷
关键词
445.1 Water Treatment Techniques - 716.1 Information Theory and Signal Processing - 722.3 Data Communication; Equipment and Techniques - 723 Computer Software; Data Handling and Applications - 723.2 Data Processing and Image Processing - 731.1 Control Systems - 913.4 Manufacturing - 971 Social Sciences;
D O I
暂无
中图分类号
学科分类号
摘要
42
引用
收藏
相关论文
共 50 条
  • [31] INTRUSION DETECTION SYSTEMS TRENDS TO COUNTERACT GROWING CYBER-ATTACKS ON CYBER-PHYSICAL SYSTEMS
    Ali, Jokha
    2021 22ND INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2021, : 699 - 704
  • [32] Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach
    Barboni, Angelo
    Rezaee, Hamed
    Boem, Francesca
    Parisini, Thomas
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3728 - 3741
  • [33] Ontology-based Detection of Cyber-Attacks to SCADA-Systems in critical Infrastructures
    Krauss, Daniel
    Thomalla, Christoph
    2016 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2016, : 70 - 73
  • [34] Physics-based detection of cyber-attacks in manufacturing systems: A machining case study
    Rahman, Md Habibor
    Shafae, Mohammed
    JOURNAL OF MANUFACTURING SYSTEMS, 2022, 64 : 676 - 683
  • [35] Physics-based detection of cyber-attacks in manufacturing systems: A machining case study
    Rahman, Md Habibor
    Shafae, Mohammed
    Journal of Manufacturing Systems, 2022, 64 : 676 - 683
  • [36] Evaluation of Naive Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks
    Ismail, Shereen
    Reza, Hassan
    2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 283 - 289
  • [37] Event-based model predictive damping control for power systems with cyber-attacks
    Liu, Yuezhi
    Chen, Yong
    Li, Meng
    ISA TRANSACTIONS, 2023, 136 : 687 - 700
  • [38] Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems
    Ding, Steven X.
    Li, Linlin
    Zhao, Dong
    Louen, Chris
    Liu, Tianyu
    AUTOMATICA, 2022, 142
  • [39] An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach
    Li, Yumei
    Voos, Holger
    Darouach, Mohamed
    Hua, Changchun
    IMA JOURNAL OF MATHEMATICAL CONTROL AND INFORMATION, 2016, 33 (04) : 1081 - 1102