References
- Goh, Jonathan, et al. "A dataset to support research in the design of secure water treatment systems." International Conference on Critical Information Infrastructures Security. Springer, Cham, 2016.
- SWaT testbed, by iTrust of SUTD, [Online]. Available: https://itrust.sutd.edu.sg/testbeds/secure-water-treatment-swat/
- Agrawal, Anand, Chuadhry Mujeeb Ahmed, and Ee-Chien Chang. "Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System." Proceedings of the 2018 on Asia Conference on Computer and Communications Security. ACM, 2018.
- Goh, Jonathan, et al. "Anomaly detection in cyber physical systems using recurrent neural networks." 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE, 2017.
- Lin, Qin, et al. "TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems." Proceedings of the 2018 on Asia Conference on Computer and Communications Security. ACM, 2018.
- Feng, Cheng, et al. "A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems." (2019).
- Gregory F Cooper and Edward Herskovits. 1992. A Bayesian method for the induction of probabilistic networks from data. Machine learning 9, 4 (1992), 309-347. https://doi.org/10.1023/A:1022649401552
- Liu, Yao, Peng Ning, and Michael K. Reiter. "False data injection attacks against state estimation in electric power grids." ACM Transactions on Information and System Security (TISSEC) 14.1 (2011): 13.
- Kwon, Sungmoon, Hyunguk Yoo, and Taeshik Shon. "Recovery Measure against Disabling Reassembly Attack to DNP3 Communication." IEICE Transactions on Information and Systems 100.8 (2017): 1790-1797.