SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security
"This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors d...
Saved in:
| Main Authors | , , , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Hoboken, NJ, USA :
Wiley,
2021.
|
| Edition | First edition. |
| Series | Wiley series on parallel and distributed computing.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781119606383 1119606381 9781119606352 1119606357 9781119606079 1119606071 9781119606031 |
| Physical Description | 1 online resource (xvi, 196 pages) : illustrations (chiefly color) |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | kn-on1178869780 | ||
| 003 | OCoLC | ||
| 005 | 20240717213016.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 200618t20212021njua ob 001 0 eng | ||
| 040 | |a DLC |b eng |e rda |e pn |c DLC |d OCLCO |d OCLCF |d YDX |d DG1 |d OCLCO |d OCLCQ |d DLC |d YDX |d OCLCO |d YUS |d OCLCO |d IEEEE |d OCLCQ |d UPM |d OCLCQ |d OCLCA |d SFB |d OCLCA |d OCLCQ |d OCLCO |d OCLCL | ||
| 020 | |a 9781119606383 |q electronic book | ||
| 020 | |a 1119606381 |q electronic book | ||
| 020 | |a 9781119606352 |q electronic book | ||
| 020 | |a 1119606357 |q electronic book | ||
| 020 | |a 9781119606079 |q electronic book | ||
| 020 | |a 1119606071 |q electronic book | ||
| 020 | |z 9781119606031 |q hardcover | ||
| 024 | 8 | |a 16807778 | |
| 024 | 7 | |a 10.1002/9781119606383 |2 doi | |
| 035 | |a (OCoLC)1178869780 | ||
| 042 | |a pcc | ||
| 100 | 1 | |a Almalawi, Abdulmohsen, |e author. | |
| 245 | 1 | 0 | |a SCADA security : |b machine learning concepts for intrusion detection and prevention : SCADA-based IDs security / |c Abdulmohsen Almalawi, King Abdulaziz University, Zahir Tari, RMIT University, Adil Fahad, Al Baha University, Xun Yi, RMIT University. |
| 250 | |a First edition. | ||
| 264 | 1 | |a Hoboken, NJ, USA : |b Wiley, |c 2021. | |
| 264 | 4 | |c ©2021 | |
| 300 | |a 1 online resource (xvi, 196 pages) : |b illustrations (chiefly color) | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 490 | 1 | |a Wiley series on parallel and distributed computing | |
| 505 | 0 | |a Introduction -- Background -- SCADA-Based Security Testbed -- Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering -- SCADA Data-Driven Anomaly Detection -- A Global Anomaly Threshold to Unsupervised Detection -- Threshold Password-Authenticated Secret Sharing Protocols -- Conclusion. | |
| 504 | |a Includes bibliographical references and index. | ||
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a "This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"-- |c Provided by publisher | ||
| 590 | |a Knovel |b Knovel (All titles) | ||
| 650 | 0 | |a Supervisory control systems. | |
| 650 | 0 | |a Automatic control |x Security measures. | |
| 650 | 0 | |a Intrusion detection systems (Computer security) | |
| 650 | 0 | |a Machine learning. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Tari, Zahir, |d 1961- |e author. | |
| 700 | 1 | |a Fahad, Adil, |e author. | |
| 700 | 1 | |a Yi, Xun, |e author. | |
| 776 | 0 | 8 | |i Print version: |a Almalawi, Abdulmohsen. |t SCADA security. |d Hoboken, NJ, USA : Wiley, 2021 |z 9781119606031 |w (DLC) 2020027876 |
| 830 | 0 | |a Wiley series on parallel and distributed computing. | |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpSCADASM2/scada-security-machine?kpromoter=marc |y Full text |