Using sensitivity analysis and cross-association for the design of intrusion detection systems in industrial cyber-physical systems

P Haller, B Genge - IEEE Access, 2017 - ieeexplore.ieee.org
The fourth industrial revolution, also known as Industry 4.0, brings many advantages
including innovative applications and services, new technologies and advanced features …

An approach for intrusion detection using fuzzy feature clustering

GR Kumar, N Mangathayaru… - … on Engineering & MIS …, 2016 - ieeexplore.ieee.org
This work discusses the approach for intrusion detection and classification by devising a
membership function, inspired from [43] and is used in this work to carry the dimensionality …

Resilient–vulnerability analysis of critical infrastructure, key resources, assets, and facilities

WO Ewa, OO Ugwu, FO Okafor - Innovative Infrastructure Solutions, 2024 - Springer
Nations are built to depend on critical infrastructures, key resources, assets, and facilities
(CIKRAFs), hence the need to effectively analyse inherent vulnerabilities, to build and …

A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures

VR Palleti, JV Joseph, A Silva - International Journal of Critical Infrastructure …, 2018 - Elsevier
Critical infrastructures (CIs) such as water, power, and transportation etc. are pivotal as they
play a significant role in a nation's economic prosperity and governance. These critical …

Text mining based approach for intrusion detection

N Mangathayaru, GR Kumar… - … on Engineering & MIS …, 2016 - ieeexplore.ieee.org
Intrusion detection is classified as NP-Hard in the literature even today. Also supervised
learning also termed classification, when performed on high dimensional documents has …

[PDF][PDF] A Distributed Intrusion Detection Model via Nondestructive Partitioning and Balanced Allocation for Big Data.

X Wu, C Zhang, R Zhang, Y Wang… - Computers, Materials & …, 2018 - cdn.techscience.cn
There are two key issues in distributed intrusion detection system, that is, maintaining load
balance of system and protecting data integrity. To address these issues, this paper …

A FEATURE CLUSTERING BASED DIMENSIONALITY REDUCTION FOR INTRUSION DETECTION (FCBDR).

GR Kumar, N Mangathayaru… - … International Journal on …, 2017 - search.ebscohost.com
This work discusses the approach for intrusion detection and classification by devising a
membership function, inspired from Yung, Jung, & Shie-Jue (2014) and used in this …

[PDF][PDF] Framework, tools and challenges in cyber security

F Basholli, DA Juraev, K Egamberdiev - 2024 - researchgate.net
In recent years, the Internet has become an integral element of the daily lifestyle of people
throughout the human society, and online crime, on the other hand, has increased along …

Designing optimal and resilient intrusion detection architectures for smart grids

B Genge, P Haller, CD Dumitru… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We formulate two intrusion detection system (IDS) design problems for smart grids. The first
one optimally places IDS devices on communication paths, while the second one addresses …

Resilience of critical infrastructures: probabilistic case study of a district heating pipeline network in municipality of Latvia

M Feofilovs, F Romagnoli - Energy Procedia, 2017 - Elsevier
The effects of disasters on communities is a critical issue to be considered in terms of
growing exposure of infrastructures to natural hazards. The significant role of the …