1 |
Chang-Hwan Lee, "Calculating Attribute Weights in K-Nearest Neighbor Algorithms using Information Theory", Journal of KIISE: Software and Applications, vol.32, Issue 9, 920-926, 2005.
|
2 |
Gardiner J., Craggs B., Green B., Rashid A., "Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds", the ACM Workshop, 2019. https://doi.org/10.1145/3338499.3357355
DOI
|
3 |
https://attack.mitre.org/software/S0603
|
4 |
Chao W., Bailing W., Yunxiao S., Yuliang W., Kai W., Hui Z., Hngri L., "Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network", Security and Communication Networks, 2021. https://doi.org/10.1155/2021/4027900
DOI
|
5 |
Akashdeep S.,Ishfaq. M., Neeraj K., "A feature reduced intrusion detection system using ANN classifier", Expert Systems with Applications, 2017. https://doi.org/10.1016/j.eswa.2017.07.005
DOI
|
6 |
R. Vinayakumar, Mamoun A., K. P. Soman, Prabaharan P., Ameer A. N, "Deep Learning Approach for Intelligent Intrusion Detection System", IEEE Access, 2019. https://doi.org/10.1109/access.2019.2895334
DOI
|
7 |
Won-Suk Choi, Kyung-Ho Joo, Hyo-Jin Jo, Moon-Chan Park, Dong-Hoon Lee, "VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System", IEEE Transactions on Information Forensics and Security, 2018. https://doi.org/10.1109/tifs.2018.2812149
DOI
|
8 |
Ondrej P., Petr B., Karel K., Radek F., Jiri M, "Application Perspective on CyberSecurity Testbed for Industrial Control Systems", Sensors, 2021. https://doi.org/10.3390/s21238119
DOI
|
9 |
Nitesh V. C., Kevin W. B., Lawrence O. H., W. Philip. K., "SMOTE: Synthetic Minority Over-sampling Technique", Journal of Artificial Intelligence Research, 2002. https://doi.org/10.1613/jair.953
DOI
|
10 |
Jae-Hyun Seo, "A Comparative Study on the Classification of the Imbalanced Intrusion Detection Dataset Based on Deep Learning", Korean Institute of Intelligent Systems, vol.28, Issue 2, 152-159, 2018. https://doi.org/10.5391/jkiis.2018.28.2.152
DOI
|
11 |
https://developer.ibm.com/articles/cc-machine-learningdeep-learning-architectures
|
12 |
Sohrab M., Alireza A., Kang K. Y., Arman S., "A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data", Electronics, 2021. https://doi.org/10.3390/electronics10040407
DOI
|
13 |
Aloqaily M., Otoum S., Al Ridhawi I., Jararweh Y., "An intrusion detection system for connected vehicles in smart cities", Ad Hoc Networks, 2019. https://doi.org/10.1016/j.adhoc.2019.02.001
DOI
|
14 |
Mete O., Inaki E.,Fatos T. Y. V., Sanjeev R. U., H. Vincent P, "Machine learning methods for attack detection in the smart grid", IEEE Transactions on Neural Networks and Learning Systems, 2015. https://doi.org/10.1109/tnnls.2015.2404803
DOI
|
15 |
https://spritz.math.unipd.it/projects/ics_survey
|
16 |
Maede Z., Marcio A. T., Raj J., "Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning", IEEE International Conference on Itelligence and Security Informatics, 2018. https://doi.org/10.1109/isi.2018.8587389
DOI
|
17 |
https://www.ibm.com/cloud/learn/neural-networks
|
18 |
Marzban C., "The ROC Curve and the Area under It as Performance Measures", Weather and Forecasting, 2004. https://doi.org/10.1175/825.1
DOI
|
19 |
Guangzhen Z., Cuixiao Z., Lijuan Z., "Intrusion Detection using Deep Belief Network and Probabilistic Neural Network", IEEE International Conference on Computational Science and Engineering, 2017. https://doi.org/10.1109/cse-euc.2017.119
DOI
|
20 |
Ansam K., Iqbal G., Peter V., Joarder K., "Survey of intrusion detection systems: techniques, datasets and challenges", Cybersecurity, 2019. https://doi.org/10.1186/s42400-019-0038-7
DOI
|
21 |
Pil-Sung Jang, "의사결정트리 기반 혁신기업 특성 분석", Korea Technology Innovaton Society, 2019.
|
22 |
Rao F. A., Amagd M.,Ebrahim A. A. G., Ammar A. A, "Survey on Cyber Security for Industrial Control Systems", International Conference on Data Analytics for Business and Industry, 2021. https://doi.org/10.1109/ICDABI53623.2021.9655902
DOI
|
23 |
https://www.ibm.com/cloud/learn/supervised-learning
|
24 |
Shaharyar K., Alberto V., Geet K., Jonathan E., Tommaso P., Sabino C., Micheal S., "Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack Scenarios", Italian Conference on Cybersecurity, 2021.
|
25 |
Dong-Gue Park, Deok-Jo Jeon, "A Model of Monitoring for Security of Industrial Control System", Journal of Korean Institute of Information Technology, vol.13, Issue 7, 1-16, 2015. http://doi.org/10.14801/jkiit.2015.13.7.1
DOI
|
26 |
Hyun-Seok Kim, Dong-Gue Park, "Implementation of abnormal behavior detection system based packet analysis for industrial control system security", Journal of the Korea Academia-Industrial cooperation Society, Vol. 19, Issue 4, 47-56, 2018. https://doi.org/10.5762/KAIS.2018.19.4.47
DOI
|
27 |
https://www.epnc.co.kr/news/articleView.html?idxno=92835
|
28 |
Mauro C., Denis D., Federico T., "A Survey on Industrial Control System Testbeds and Datasets for Security Research", IEEE Communications Surveys& Tutorials, 2021. https://doi.org/10.1109/comst.2021.3094360
DOI
|
29 |
https://blog.lgcns.com/1741
|
30 |
David B., Maede Z., Aiman E., Raj J., Khaled K., Nader M., "Cybersecurity for Industrial Control Systems: A Survey", Industrial Control Systems Security, 2019. https://doi.org/10.48550/arXiv.2002.04124
DOI
|
31 |
Yong-Hee Jeon, "산업제어시스템 보안을 위한 네트워크 설계 및 구조", Korea Institute of Information Security & Cryptology, v.19, Issue 5, 2009.
|
32 |
Austris U., Bernhards B., "Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development", 8th International Conference on Information Systems Security and Privacy, 2022. https://doi.org/10.5220/0010879500003120
DOI
|
33 |
Myung-Kil Ahn, Jung-Ryun Lee, "Research on Threat Analysis methodology based on ICS-ATT&CK for ICS/SCADA system", 2020.
|