The pervasiveness in the Industrial Internet of Things (IIoT) due to the application of supervisory control and data acquisition (SCADA) has led to the growth of heterogeneous …
Detecting intrusions from the supervisory control and data acquisition (SCADA) systems is one of the most essential and challenging processes in recent times. Most of the …
BS Bhati, CS Rai - … Computing in Engineering: Select Proceedings of …, 2020 - Springer
With the swift growth of Internet technology, various types of attacks and intrusions are taking place over the Internet. Intrusion Detection Systems (IDS) are widely used to detect attacks …
S Moustakidis, P Karlsson - Cybersecurity, 2020 - Springer
Intrusion detection systems (IDS) can play a significant role in detecting security threats or malicious attacks that aim to steal information and/or corrupt network protocols. To deal with …
O Faker, E Dogdu - Proceedings of the 2019 ACM Southeast conference, 2019 - dl.acm.org
In this paper, Big Data and Deep Learning Techniques are integrated to improve the performance of intrusion detection systems. Three classifiers are used to classify network …
Specific intrusion detection systems (IDSs) are needed to secure modern supervisory control and data acquisition (SCADA) systems due to their architecture, stringent real-time …
Integrating IoT devices in SCADA systems has provided efficient and improved data collection and transmission technologies. This enhancement comes with significant security …
Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …
The intrusions are increasing daily, so there is a huge amount of privacy violations, financial loss, illegal transferring of information, etc. Various forms of intrusion occur in networks, such …