Linked e-resources
Details
Table of Contents
Introduction
Background
SCADA-Based Security Testbed
Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering
SCADA Data-Driven Anomaly Detection
A Global Anomaly Threshold to Unsupervised Detection
Threshold Password-Authenticated Secret Sharing Protocols
Conclusion.
Background
SCADA-Based Security Testbed
Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering
SCADA Data-Driven Anomaly Detection
A Global Anomaly Threshold to Unsupervised Detection
Threshold Password-Authenticated Secret Sharing Protocols
Conclusion.