ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
29
views
0
references
Top references
cited by
1
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,363
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
“Industrial Control System Network Intrusion Detection by Telemetry Analysis,”
Author(s):
S. Ponomarev
,
T. Atkison
Publication date:
2016
Journal:
IEEE Transactions on Dependable and Secure Computing
Read this article at
ScienceOpen
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electronic Workshops in Computing (eWiC)
Data availability:
ScienceOpen disciplines:
Applied computer science
,
Computer science
,
Security & Cryptology
,
Graphics & Multimedia design
,
General computer science
,
Human-computer-interaction
Comments
Comment on this article
Sign in to comment
Similar content
2,363
Modeling abundance, distribution, movement and space use with camera and telemetry data
Authors:
B. Chandler R.
Fine-scale acoustic telemetry reveals unexpected lake trout, Salvelinus namaycush , spawning habitats in northern Lake Huron, North America
Authors:
Thomas Binder
,
Steven Farha
,
Henry T. Thompson
…
A comparison of baseline cardiovascular parameters and the sensitivity to detect changes in systemic blood pressure and heart rate in beagle dogs using DSI M11 disposable telemetry devices
Authors:
Matthew Abernathy
,
Nataliya Sadekova
,
Derek Leishman
…
See all similar
Cited by
1
PLCBlockMon: Data Logging and Extraction on PLCs for Cyber Intrusion Detection
Authors:
Mislav Findrik
,
Paul Smith
,
Kevin Quill
…
See all cited by