SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security
"This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors d...
Saved in:
Main Authors: | , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Hoboken, NJ, USA :
Wiley,
2021.
|
Edition: | First edition. |
Series: | Wiley series on parallel and distributed computing.
|
Subjects: | |
ISBN: | 9781119606383 1119606381 9781119606352 1119606357 9781119606079 1119606071 9781119606031 |
Physical Description: | 1 online resource (xvi, 196 pages) : illustrations (chiefly color) |
LEADER | 03840cam a2200565 i 4500 | ||
---|---|---|---|
001 | kn-on1178869780 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 200618t20212021njua ob 001 0 eng | ||
040 | |a DLC |b eng |e rda |e pn |c DLC |d OCLCO |d OCLCF |d YDX |d DG1 |d OCLCO |d OCLCQ |d DLC |d YDX |d OCLCO |d YUS |d OCLCO |d IEEEE |d OCLCQ |d UPM |d OCLCQ |d OCLCA |d SFB |d OCLCA |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9781119606383 |q electronic book | ||
020 | |a 1119606381 |q electronic book | ||
020 | |a 9781119606352 |q electronic book | ||
020 | |a 1119606357 |q electronic book | ||
020 | |a 9781119606079 |q electronic book | ||
020 | |a 1119606071 |q electronic book | ||
020 | |z 9781119606031 |q hardcover | ||
024 | 8 | |a 16807778 | |
024 | 7 | |a 10.1002/9781119606383 |2 doi | |
035 | |a (OCoLC)1178869780 | ||
042 | |a pcc | ||
100 | 1 | |a Almalawi, Abdulmohsen, |e author. | |
245 | 1 | 0 | |a SCADA security : |b machine learning concepts for intrusion detection and prevention : SCADA-based IDs security / |c Abdulmohsen Almalawi, King Abdulaziz University, Zahir Tari, RMIT University, Adil Fahad, Al Baha University, Xun Yi, RMIT University. |
250 | |a First edition. | ||
264 | 1 | |a Hoboken, NJ, USA : |b Wiley, |c 2021. | |
264 | 4 | |c ©2021 | |
300 | |a 1 online resource (xvi, 196 pages) : |b illustrations (chiefly color) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Wiley series on parallel and distributed computing | |
505 | 0 | |a Introduction -- Background -- SCADA-Based Security Testbed -- Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering -- SCADA Data-Driven Anomaly Detection -- A Global Anomaly Threshold to Unsupervised Detection -- Threshold Password-Authenticated Secret Sharing Protocols -- Conclusion. | |
504 | |a Includes bibliographical references and index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a "This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"-- |c Provided by publisher | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Supervisory control systems. | |
650 | 0 | |a Automatic control |x Security measures. | |
650 | 0 | |a Intrusion detection systems (Computer security) | |
650 | 0 | |a Machine learning. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Tari, Zahir, |d 1961- |e author. | |
700 | 1 | |a Fahad, Adil, |e author. | |
700 | 1 | |a Yi, Xun, |e author. | |
776 | 0 | 8 | |i Print version: |a Almalawi, Abdulmohsen. |t SCADA security. |d Hoboken, NJ, USA : Wiley, 2021 |z 9781119606031 |w (DLC) 2020027876 |
830 | 0 | |a Wiley series on parallel and distributed computing. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpSCADASM2/scada-security-machine?kpromoter=marc |y Full text |