Found: 398
Select item for more details and to access through your institution.
Systematic Analysis of threats, Machine Learning solutions and Challenges for Securing IoT environment.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 367, doi. 10.54216/JCIM.140227
- By:
- Publication type:
- Article
Parameter estimation methods for time‐invariant continuous‐time systems from dynamical discrete output responses based on the Laplace transforms.
- Published in:
- International Journal of Adaptive Control & Signal Processing, 2024, v. 38, n. 9, p. 3213, doi. 10.1002/acs.3871
- By:
- Publication type:
- Article
Development of a Novel Open Control System Implementation Method under Industrial IoT.
- Published in:
- Future Internet, 2024, v. 16, n. 8, p. 293, doi. 10.3390/fi16080293
- By:
- Publication type:
- Article
Multi-Channel Multi-Scale Convolution Attention Variational Autoencoder (MCA-VAE): An Interpretable Anomaly Detection Algorithm Based on Variational Autoencoder.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 16, p. 5316, doi. 10.3390/s24165316
- By:
- Publication type:
- Article
False Data Injection Attack Detection, Isolation, and Identification in Industrial Control Systems Based on Machine Learning: Application in Load Frequency Control.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3239, doi. 10.3390/electronics13163239
- By:
- Publication type:
- Article
A Study of Noise Effect in Feedback Control with White Noise Analysis.
- Published in:
- Open Systems & Information Dynamics (OSID), 2024, v. 31, n. 2, p. 1, doi. 10.1142/S1230161224500100
- By:
- Publication type:
- Article
Real Time Automation and Ratio Control Using PLC & SCADA in Industry 4.0.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 45, n. 2, p. 1495, doi. 10.32604/csse.2023.030635
- By:
- Publication type:
- Article
Optimal feature points for tracking multiple moving objects in active camera model.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 18, p. 10999, doi. 10.1007/s11042-015-2823-y
- By:
- Publication type:
- Article
Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 15, p. 21642, doi. 10.1007/s11227-024-06273-9
- By:
- Publication type:
- Article
A TabPFN-based intrusion detection system for the industrial internet of things.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 14, p. 20080, doi. 10.1007/s11227-024-06166-x
- By:
- Publication type:
- Article
Semi-supervised attack detection in industrial control systems with deviation networks and feature selection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 10, p. 14600, doi. 10.1007/s11227-024-06018-8
- By:
- Publication type:
- Article
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 6, p. 7876, doi. 10.1007/s11227-023-05764-5
- By:
- Publication type:
- Article
A risk assessment model for similar attack scenarios in industrial control system.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 14, p. 15955, doi. 10.1007/s11227-023-05269-1
- By:
- Publication type:
- Article
An application of fuzzy logistic regression for predicting CVSS severity category of industrial control systems.
- Published in:
- RAIRO: Operations Research (2804-7303), 2022, v. 56, n. 6, p. 4083, doi. 10.1051/ro/2022189
- By:
- Publication type:
- Article
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa020
- By:
- Publication type:
- Article
ROLE OF PLC IN INDUSTRIAL AND COMMERCIAL APPLICATIONS.
- Published in:
- i-Manager's Journal on Instrumentation & Control Engineering, 2020, v. 8, n. 2, p. 29, doi. 10.26634/jic.8.2.18085
- By:
- Publication type:
- Article
Cyberattack Defense with Appropriate Address-changing Frequency in Industrial Control Systems.
- Published in:
- Sensors & Materials, 2022, v. 34, n. 7, Part 1, p. 2567, doi. 10.18494/SAM3843
- By:
- Publication type:
- Article
Design of Industrial Control System Secure Communication Using Moving Target Defense with Legacy Infrastructure.
- Published in:
- Sensors & Materials, 2021, v. 33, n. 10, Part 1, p. 3415, doi. 10.18494/SAM.2021.3513
- By:
- Publication type:
- Article
The economic influence of industrial control systems in the energy and transport sectors.
- Published in:
- KSI Transactions on Knowledge Society, 2020, v. 13, n. 1, p. 25
- By:
- Publication type:
- Article
Ex vivo 3D scanning and specimen mapping in anatomic pathology.
- Published in:
- Journal of Pathology Informatics, 2023, v. 14, p. 1, doi. 10.1016/j.jpi.2022.100186
- By:
- Publication type:
- Article
Program Behavior Dynamic Trust Measurement and Evaluation Based on Data Analysis.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 2, p. 249, doi. 10.3390/sym16020249
- By:
- Publication type:
- Article
Application of GA-WELM Model Based on Stratified Cross-Validation in Intrusion Detection.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 9, p. 1719, doi. 10.3390/sym15091719
- By:
- Publication type:
- Article
PREIUD: An Industrial Control Protocols Reverse Engineering Tool Based on Unsupervised Learning and Deep Neural Network Methods.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 3, p. 706, doi. 10.3390/sym15030706
- By:
- Publication type:
- Article
Aye: A Trusted Forensic Method for Firmware Tampering Attacks.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 1, p. 145, doi. 10.3390/sym15010145
- By:
- Publication type:
- Article
Identification of Private ICS Protocols Based on Raw Traffic.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 9, p. 1743, doi. 10.3390/sym13091743
- By:
- Publication type:
- Article
Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 3, p. 519, doi. 10.3390/sym13030519
- By:
- Publication type:
- Article
New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 4, p. 1945, doi. 10.3390/sym7041945
- By:
- Publication type:
- Article
Deep Learning Based Early Intrusion Detection in IIoT using Honeypot.
- Published in:
- Majlesi Journal of Electrical Engineering, 2023, v. 17, n. 2, p. 69, doi. 10.30486/mjee.2023.1970288.0
- By:
- Publication type:
- Article
Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 10, p. 8076, doi. 10.3390/su15108076
- By:
- Publication type:
- Article
DDoS Cyber-Incident Detection in Smart Grids.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 5, p. N.PAG, doi. 10.3390/su14052730
- By:
- Publication type:
- Article
MITRE ATT&CK Based Evaluation on In-Network Deception Technology for Modernized Electrical Substation Systems.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 3, p. 1256, doi. 10.3390/su14031256
- By:
- Publication type:
- Article
A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 17, p. 9597, doi. 10.3390/su13179597
- By:
- Publication type:
- Article
SYSTEM FOR MONITORING CONTROL IN INDUSTRIAL TECHNOLOGICAL PROCESSES.
- Published in:
- Annals of DAAAM & Proceedings, 2020, v. 31, p. 644, doi. 10.2507/31st.daaam.proceedings.089
- By:
- Publication type:
- Article
COMPARATIVE STUDY OF FEATURE SELECTION TECHNIQUES RESPECTING NOVELTY DETECTION IN THE INDUSTRIAL CONTROL SYSTEM ENVIRONMENT.
- Published in:
- Annals of DAAAM & Proceedings, 2018, v. 29, p. 1084, doi. 10.2507/29th.daaam.proceedings.155
- By:
- Publication type:
- Article
DIGITAL-ANALOG INPUT / OUTPUT DEVICE WITH THE MATLAB/SIMULINK ENVIRONMENT IN REAL TIME MODE.
- Published in:
- Annals of DAAAM & Proceedings, 2017, v. 28, p. 1111, doi. 10.2507/28th.daaam.proceedings.155
- By:
- Publication type:
- Article
CLASSIFICATION OF AUTOMATIC CONTROLLERS DIAGRAMS.
- Published in:
- Annals of DAAAM & Proceedings, 2017, v. 28, p. 967, doi. 10.2507/28th.daaam.proceedings.134
- By:
- Publication type:
- Article
A New Type-3 Fuzzy PID for Energy Management in Microgrids.
- Published in:
- Advances in Mathematical Physics, 2022, p. 1, doi. 10.1155/2022/8737448
- By:
- Publication type:
- Article
A New Type-3 Fuzzy PID for Energy Management in Microgrids.
- Published in:
- Advances in Mathematical Physics, 2022, p. 1, doi. 10.1155/2022/8737448
- By:
- Publication type:
- Article
Real-Time Memory Data Optimization Mechanism of Edge IoT Agent.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 37, n. 1, p. 799, doi. 10.32604/iasc.2023.038330
- By:
- Publication type:
- Article
A Novel Deep Learning Representation for Industrial Control System Data.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 36, n. 3, p. 2703, doi. 10.32604/iasc.2023.033762
- By:
- Publication type:
- Article
Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 31, n. 3, p. 1345, doi. 10.32604/iasc.2022.020801
- By:
- Publication type:
- Article
Automated Inspection of Char Morphologies in Colombian Coals using Image Analysis.
- Published in:
- Intelligent Automation & Soft Computing, 2020, v. 26, n. 3, p. 397, doi. 10.32604/iasc.2020.013916
- By:
- Publication type:
- Article
Integrated cyberattack detection and resilient control strategies using Lyapunov‐based economic model predictive control.
- Published in:
- AIChE Journal, 2020, v. 66, n. 12, p. 1, doi. 10.1002/aic.17084
- By:
- Publication type:
- Article
Multivariate auto‐correlated process control by a residual‐based mixed CUSUM‐EWMA model.
- Published in:
- Quality & Reliability Engineering International, 2023, v. 39, n. 4, p. 1120, doi. 10.1002/qre.3278
- By:
- Publication type:
- Article
Cluster-Based Bounded Influence Regression.
- Published in:
- Quality & Reliability Engineering International, 2014, v. 30, n. 1, p. 97, doi. 10.1002/qre.1480
- By:
- Publication type:
- Article
An Overview of the Security of Programmable Logic Controllers in Industrial Control Systems.
- Published in:
- Encyclopedia, 2024, v. 4, n. 2, p. 874, doi. 10.3390/encyclopedia4020056
- By:
- Publication type:
- Article
Dynamic Leadership Mechanism in Homing Pigeon Flocks.
- Published in:
- Biomimetics (2313-7673), 2024, v. 9, n. 2, p. 88, doi. 10.3390/biomimetics9020088
- By:
- Publication type:
- Article
The Dynamic Symmetric Four-Key-Generators System for Securing Data Transmission in the Industrial Control System.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2021, v. 14, n. 1, p. 376, doi. 10.22266/ijies2021.0228.35
- By:
- Publication type:
- Article
Edge Computing-Based Modular Control System for Industrial Environments.
- Published in:
- Processes, 2024, v. 12, n. 6, p. 1165, doi. 10.3390/pr12061165
- By:
- Publication type:
- Article
Security Assessment of Industrial Control System Applying Reinforcement Learning.
- Published in:
- Processes, 2024, v. 12, n. 4, p. 801, doi. 10.3390/pr12040801
- By:
- Publication type:
- Article