A log mining approach for process monitoring in SCADA
Open Access
- 21 April 2012
- journal article
- Published by Springer Science and Business Media LLC in International Journal of Information Security
- Vol. 11 (4), 231-251
- https://doi.org/10.1007/s10207-012-0163-8
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access TaintednessPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Novelty detection and management to safeguard information-intensive critical infrastructuresInternational Journal of Emergency Management, 2007
- MAFIA: a maximal frequent itemset algorithmIEEE Transactions on Knowledge and Data Engineering, 2005
- Fast algorithms for frequent itemset mining using FP-treesIEEE Transactions on Knowledge and Data Engineering, 2005
- Principle Components and Importance Ranking of Distributed AnomaliesMachine Learning, 2005
- Safeguarding SCADA Systems with Anomaly DetectionLecture Notes in Computer Science, 2003
- Profiling of High-Frequency Accident Locations by Use of Association RulesTransportation Research Record: Journal of the Transportation Research Board, 2003
- Mining intrusion detection alarms for actionable knowledgePublished by Association for Computing Machinery (ACM) ,2002
- Discovering actionable patterns in event dataIBM Systems Journal, 2002
- Data Mining Approaches for Intrusion DetectionPublished by Defense Technical Information Center (DTIC) ,2000