2017
DOI: 10.1016/j.ins.2016.09.041
|View full text |Cite
|
Sign up to set email alerts
|

Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0
5

Year Published

2018
2018
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 81 publications
(41 citation statements)
references
References 24 publications
0
36
0
5
Order By: Relevance
“…Without a properly designed cyber-planning-physical system security, the whole system might be at risk of cyber-attacks such DDOS (Distributed Denial of Service), data theft, eavesdropping, and malicious software. The attacker can delete, modify, steal, or exploit the information and resources for inappropriate reasons [75]. Most published papers did not properly cover providing security involved with BIM.…”
Section: Cluster Securitymentioning
confidence: 99%
“…Without a properly designed cyber-planning-physical system security, the whole system might be at risk of cyber-attacks such DDOS (Distributed Denial of Service), data theft, eavesdropping, and malicious software. The attacker can delete, modify, steal, or exploit the information and resources for inappropriate reasons [75]. Most published papers did not properly cover providing security involved with BIM.…”
Section: Cluster Securitymentioning
confidence: 99%
“…Additionally, high-dimensional auxiliary variables in chemical processes result in highly complex models and often incomplete model structures [56]. The moving window method can obtain the latest data representing the current process [57] and adaptively update that data [58], and the cosine similarity correlation calculation method can effectively measure the correlations between vectors [59] and identify the effectiveness of the influences [60]. Therefore, a sample data updating method using moving window--cosine similarity-based soft sensor modeling is proposed to update the sample datasets of soft sensor models for chemical processes and improve their prediction performance.…”
Section: Adaptive Soft Sensor Developmentmentioning
confidence: 99%
“…Apart from Beehive, the proposed semi-supervised approach only by using K-Means approach can self-merge the information of unknown malware which is unlabeled data into detection system as discussed by [7]. The semi-supervised approach extracts the information of the cluster before inserts the information into the SVM, which is support vector machine classification system by applying global K-Means clustering algorithm.…”
Section: ) Identifying the Number Of Clusters (K)mentioning
confidence: 99%