Please use this identifier to cite or link to this item: http://dspace2020.uniten.edu.my:8080/handle/123456789/21041
Full metadata record
DC FieldValueLanguage
dc.contributor.authorQassim Q.en_US
dc.contributor.authorAhmad A.R.en_US
dc.contributor.authorIsmail R.en_US
dc.contributor.authorAbu Bakar A.en_US
dc.contributor.authorAbdul Rahim F.en_US
dc.contributor.authorMokhtar M.Z.en_US
dc.contributor.authorRamli R.en_US
dc.contributor.authorMohd Yusof B.en_US
dc.contributor.authorMahdi M.N.en_US
dc.date.accessioned2021-08-27T01:58:18Z-
dc.date.available2021-08-27T01:58:18Z-
dc.date.issued2019-
dc.identifier.urihttp://dspace2020.uniten.edu.my:8080/handle/123456789/21041-
dc.description.abstractThe increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf (COTS) products, as well as open communication protocols, made them attractive targets to various threat agents including cyber-criminals, national-state, and cyber-terrorists. Given that, today's ICSs are deriving the most critical national infrastructures. Therefore, this raises tremendous needs to secure these systems against cyber-attacks. Intrusion detection technology has been considered as one of the most essential security precautions for ICS networks. It can effectively detect potential cyber-attacks and malicious activities and prevent catastrophic consequences. This paper puts forward a new method to detect malicious activities at the ICS net-works. © 2019 IEEE.en_US
dc.language.isoenen_US
dc.titleAn Anomaly Detection Technique for Deception Attacks in Industrial Control Systemsen_US
dc.typeconference paperen_US
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.languageiso639-1en-
item.fulltextWith Fulltext-
item.grantfulltextreserved-
item.openairetypeconference paper-
item.cerifentitytypePublications-
Appears in Collections:UNITEN Ebook and Article
Files in This Item:
File Description SizeFormat 
This document is not yet available.pdf
  Restricted Access
396.12 kBAdobe PDFView/Open    Request a copy
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.