ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
13
views
4
references
Top references
cited by
16
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,122
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Industrial Control System Traffic Data Sets for Intrusion Detection Research
other
Author(s):
Thomas Morris
,
Wei Gao
Publication date
(Print):
2014
Publisher:
Springer International Publishing
Read this book at
Publisher
Further versions
open (via free pdf)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Collective Dynamics
Most cited references
4
Record
: found
Abstract
: not found
Article
: not found
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids
Robert Green II
,
Mansoor Alam
,
Weiqing Sun
…
(2011)
0
comments
Cited
57
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems
A Trombetta
,
I. Nai Fovino
,
M. Masera
…
(2011)
0
comments
Cited
27
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Anomaly Detection for Cybersecurity of the Substations
Chen-Ching Liu
,
Chee-Wooi Ten
,
Junho Hong
(2011)
0
comments
Cited
22
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 65-78
DOI:
10.1007/978-3-662-45355-1_5
SO-VID:
d073f2bb-fa5c-4fa1-bb67-6e73947f8473
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 4
Business IT Alignment from Business Model to Enterprise Architecture
pp. 83
A Coopetition Space for Complex Product Specification
pp. 16
Creating Declarative Process Models Using Test Driven Modeling Suite
pp. 522
Resurgence of Informatics Education in Schools
pp. 60
XES, XESame, and ProM 6
pp. 65
Industrial Control System Traffic Data Sets for Intrusion Detection Research
pp. 123
Modeling the Context of Scientific Information: Mapping VIVO and CERIF
pp. 133
Similarity Hashing Based on Levenshtein Distances
pp. 149
Using Approximate Matching to Reduce the Volume of Digital Data
pp. 162
Implicit Predictive Indicators: Mouse Activity and Dwell Time
pp. 174
Robust and Flexible Error Handling in the AristaFlow BPM Suite
pp. 198
Change Patterns for Model Creation: Investigating the Role of Nesting Depth
pp. 205
Alaska Simulator Toolset for Conducting Controlled Experiments on Process Flexibility
pp. 214
Multi-Tenancy Multi-Target (MT2): A SaaS Architecture for the Cloud
pp. 217
Automatic Business Process Model Translation with BPMT
pp. 222
Facing the Challenges of Genome Information Systems: A Variation Analysis Prototype
pp. 239
A Multi-instance Multi-label Learning Framework of Image Retrieval
pp. 241
A Research Program for Studying the Impact of Process Representation on Risk Analysis
pp. 249
The Retrieval of Shoeprint Images Based on the Integral Histogram of the Gabor Transform Domain
pp. 253
Smartphone Message Sentiment Analysis
pp. 271
Anomaly Detection of Trajectories with Kernel Density Estimation by Conformal Prediction
pp. 279
Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool
pp. 309
Data Corpora for Digital Forensics Education and Research
pp. 361
Non-monotonic Reasoning in Conceptual Modeling and Ontology Design: A Proposal
pp. 406
A Proposal of Consumer Driven Framework for Enabling Sustainable Production and Consumption
pp. 510
Supporting Interoperability of Virtual Factories
pp. 614
Similarity Based Cross-Section Segmentation in Rough Log End Images
pp. 626
Attracting Young Talents to Manufacturing: A Holistic Approach
Similar content
3,122
Significance of chronic toxoplasmosis in epidemiology of road traffic accidents in Russian Federation
Authors:
Ekaterina Stepanova
,
Anatoly Kondrashin
,
Vladimir P Sergiev
…
Assessing air quality changes in large cities during COVID-19 lockdowns: The impacts of traffic-free urban conditions in Almaty, Kazakhstan
Authors:
Aiymgul Kerimray
,
Nassiba Baimatova
,
Olga P. Ibragimova
…
Kimberlite, lamproite, ultramafic lamprophyre, and carbonatite relationships on the Dharwar Craton, India; an example from the Khaderpet pipe, a diamondiferous ultramafic with associated carbonatite intrusion
Authors:
C.B. SMITH
,
S.E Haggerty
,
B Chatterjee
…
See all similar
Cited by
16
The Duo of Artificial Intelligence and Big Data for Industry 4.0: Applications, Techniques, Challenges, and Future Research Directions
Authors:
Senthil Kumar Jagatheesaperumal
,
Mohamed Rahouti
,
Kashif Ahmad
…
Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network
Authors:
Yingxu Lai
,
Jingwen Zhang
,
Zenghui Liu
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure
Authors:
Nicholas R. Rodofile
,
Thomas Schmidt
,
Sebastian T. Sherry
…
See all cited by