SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security / Abdulmohsen Almalawi, King Abdulaziz University, Zahir Tari, RMIT University, Adil Fahad, Al Baha University, Xun Yi, RMIT University.
2021
TJ222 .A46 2021
Linked e-resources
Linked Resource
Online Access
Details
Title
SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security / Abdulmohsen Almalawi, King Abdulaziz University, Zahir Tari, RMIT University, Adil Fahad, Al Baha University, Xun Yi, RMIT University.
Edition
First edition.
ISBN
9781119606383 (electronic book)
1119606381 (electronic book)
9781119606352 (electronic book)
1119606357 (electronic book)
9781119606079 (electronic book)
1119606071 (electronic book)
9781119606031
1119606381 (electronic book)
9781119606352 (electronic book)
1119606357 (electronic book)
9781119606079 (electronic book)
1119606071 (electronic book)
9781119606031
Published
Hoboken, NJ, USA : Wiley, 2021.
Copyright
©2021
Language
English
Description
1 online resource (xvi, 196 pages) : illustrations.
Call Number
TJ222 .A46 2021
Dewey Decimal Classification
629.8/95583
Bibliography, etc. Note
Includes bibliographical references and index.
Access Note
Access limited to authorized users
Reproduction
Electronic reproduction. Ann Arbor, MI Available via World Wide Web.
Source of Description
Description based on online resource; title from digital title page (viewed on July 28, 2021).
Added Corporate Author
ProQuest (Firm)
Series
Wiley series on parallel and distributed computing.
Available in Other Form
SCADA security.
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Introduction
Background
SCADA-Based Security Testbed
Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering
SCADA Data-Driven Anomaly Detection
A Global Anomaly Threshold to Unsupervised Detection
Threshold Password-Authenticated Secret Sharing Protocols
Conclusion.
Background
SCADA-Based Security Testbed
Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering
SCADA Data-Driven Anomaly Detection
A Global Anomaly Threshold to Unsupervised Detection
Threshold Password-Authenticated Secret Sharing Protocols
Conclusion.