A survey of physics-based attack detection in cyber-physical systems

J Giraldo, D Urbina, A Cardenas, J Valente… - ACM Computing …, 2018 - dl.acm.org
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of
research. In its basic form, a security monitor creates time-series models of sensor readings …

Limiting the impact of stealthy attacks on industrial control systems

DI Urbina, JA Giraldo, AA Cardenas… - Proceedings of the …, 2016 - dl.acm.org
While attacks on information systems have for most practical purposes binary outcomes
(information was manipulated/eavesdropped, or not), attacks manipulating the sensor or …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

[PDF][PDF] Evaluation measures for models assessment over imbalanced data sets

M Bekkar, HK Djemaa, TA Alitouche - J Inf Eng Appl, 2013 - eva.fing.edu.uy
Imbalanced data learning is one of the challenging problems in data mining; among this
matter, founding the right model assessment measures is almost a primary research issue …

A detailed analysis of the KDD CUP 99 data set

M Tavallaee, E Bagheri, W Lu… - 2009 IEEE symposium …, 2009 - ieeexplore.ieee.org
During the last decade, anomaly detection has attracted the attention of many researchers to
overcome the weakness of signature-based IDSs in detecting novel attacks, and …

Security evaluation of pattern classifiers under attack

B Biggio, G Fumera, F Roli - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
Pattern classification systems are commonly used in adversarial applications, like biometric
authentication, network intrusion detection, and spam filtering, in which data can be …

A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

[HTML][HTML] Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

Veremi: A dataset for comparable evaluation of misbehavior detection in vanets

RW Van Der Heijden, T Lukaseder, F Kargl - Security and Privacy in …, 2018 - Springer
Vehicular networks are networks of communicating vehicles, a major enabling technology
for future cooperative and autonomous driving technologies. The most important messages …

Toward credible evaluation of anomaly-based intrusion-detection methods

M Tavallaee, N Stakhanova… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Since the first introduction of anomaly-based intrusion detection to the research community
in 1987, the field has grown tremendously. A variety of methods and techniques introducing …