共 50 条
[21]
A New Approach for Detection of Insider Attacks
[J].
2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU),
2013,
[23]
Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
[J].
APPLIED SCIENCES-BASEL,
2019, 9 (19)
[24]
SPEAR: A systematic approach for connection pattern-based anomaly detection in SCADA systems
[J].
7TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2013),
2014, 12
:168-173
[25]
A leak detection system based SCADA
[J].
PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A AND B: BUILDING CORE COMPETENCIES THROUGH IE&EM,
2007,
:1570-1573
[26]
Detection of Insider Attacks in Cloud based e-Healthcare Environment
[J].
2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT),
2014,
:195-200
[27]
Network Anomaly Detection for m-connected SCADA Networks
[J].
2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013),
2013,
:351-354
[28]
Anomaly Detection for DDoS Attacks Based on Gini Coefficient
[J].
PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED ICT AND EDUCATION,
2013, 33
:649-654