Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
field devices
biblio
Deep-Learning-Based Network Intrusion Detection for SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:28am
SCADA network protocols
industrial control
Industrial Control Systems
learning (artificial intelligence)
network intrusion detection system
network-based cyber attacks
pubcrawl
realistic SCADA traffic data sets
Resiliency
individual network packets
SCADA system operators
SCADA System Security
SCADA systems
SCADA Systems Security
site-specific network attack
specialized attacks
supervisory control and data acquisition networks
unseen network attack instances
convolutional neural network
ICs
attacks on DNP3 protocol
Compositionality
computer network security
computing nodes
conventional network attacks
conventional SCADA specific network-based attacks
convolutional neural nets
Anomaly Detection
Cyber Attack Detection
deep learning
deep-learning-based network intrusion detection system
energy-delivery systems
field devices
Human behavior
ICS network infrastructure
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 9:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks