Please use this identifier to cite or link to this item:
                
       http://dspace2020.uniten.edu.my:8080/handle/123456789/21041Full metadata record
| DC Field | Value | Language | 
|---|---|---|
| dc.contributor.author | Qassim Q. | en_US | 
| dc.contributor.author | Ahmad A.R. | en_US | 
| dc.contributor.author | Ismail R. | en_US | 
| dc.contributor.author | Abu Bakar A. | en_US | 
| dc.contributor.author | Abdul Rahim F. | en_US | 
| dc.contributor.author | Mokhtar M.Z. | en_US | 
| dc.contributor.author | Ramli R. | en_US | 
| dc.contributor.author | Mohd Yusof B. | en_US | 
| dc.contributor.author | Mahdi M.N. | en_US | 
| dc.date.accessioned | 2021-08-27T01:58:18Z | - | 
| dc.date.available | 2021-08-27T01:58:18Z | - | 
| dc.date.issued | 2019 | - | 
| dc.identifier.uri | http://dspace2020.uniten.edu.my:8080/handle/123456789/21041 | - | 
| dc.description.abstract | The increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf (COTS) products, as well as open communication protocols, made them attractive targets to various threat agents including cyber-criminals, national-state, and cyber-terrorists. Given that, today's ICSs are deriving the most critical national infrastructures. Therefore, this raises tremendous needs to secure these systems against cyber-attacks. Intrusion detection technology has been considered as one of the most essential security precautions for ICS networks. It can effectively detect potential cyber-attacks and malicious activities and prevent catastrophic consequences. This paper puts forward a new method to detect malicious activities at the ICS net-works. © 2019 IEEE. | en_US | 
| dc.language.iso | en | en_US | 
| dc.title | An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems | en_US | 
| dc.type | conference paper | en_US | 
| item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - | 
| item.grantfulltext | reserved | - | 
| item.cerifentitytype | Publications | - | 
| item.openairetype | conference paper | - | 
| item.fulltext | With Fulltext | - | 
| item.languageiso639-1 | en | - | 
| Appears in Collections: | UNITEN Ebook and Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| This document is not yet available.pdf Restricted Access | 396.12 kB | Adobe PDF | View/Open Request a copy | 
Google ScholarTM
		
		
   		    Check
	Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.