Please use this identifier to cite or link to this item:
http://dspace2020.uniten.edu.my:8080/handle/123456789/21041
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Qassim Q. | en_US |
dc.contributor.author | Ahmad A.R. | en_US |
dc.contributor.author | Ismail R. | en_US |
dc.contributor.author | Abu Bakar A. | en_US |
dc.contributor.author | Abdul Rahim F. | en_US |
dc.contributor.author | Mokhtar M.Z. | en_US |
dc.contributor.author | Ramli R. | en_US |
dc.contributor.author | Mohd Yusof B. | en_US |
dc.contributor.author | Mahdi M.N. | en_US |
dc.date.accessioned | 2021-08-27T01:58:18Z | - |
dc.date.available | 2021-08-27T01:58:18Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://dspace2020.uniten.edu.my:8080/handle/123456789/21041 | - |
dc.description.abstract | The increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf (COTS) products, as well as open communication protocols, made them attractive targets to various threat agents including cyber-criminals, national-state, and cyber-terrorists. Given that, today's ICSs are deriving the most critical national infrastructures. Therefore, this raises tremendous needs to secure these systems against cyber-attacks. Intrusion detection technology has been considered as one of the most essential security precautions for ICS networks. It can effectively detect potential cyber-attacks and malicious activities and prevent catastrophic consequences. This paper puts forward a new method to detect malicious activities at the ICS net-works. © 2019 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.title | An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems | en_US |
dc.type | conference paper | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.languageiso639-1 | en | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | reserved | - |
item.openairetype | conference paper | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | UNITEN Ebook and Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
This document is not yet available.pdf Restricted Access | 396.12 kB | Adobe PDF | View/Open Request a copy |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.