Machine Learning
Unsupervised learning
Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACM Transactions on Information and System Security (TISSEC)
Introduction to algorithms
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
On the Reliability of AI Planning Software in Real-Time Applications
IEEE Transactions on Knowledge and Data Engineering
Experiences with Specification-Based Intrusion Detection
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Analyzing dynamic voting using Petri nets
SRDS '96 Proceedings of the 15th Symposium on Reliable Distributed Systems
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
A Clustering Approach to Wireless Network Intrusion Detection
ICTAI '05 Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence
Mobile Networks and Applications
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02
Neural network based intrusion detection system for critical infrastructures
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
Time-based intrusion detection in cyber-physical systems
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems
The Design and Implementation of Host-Based Intrusion Detection System
IITSI '10 Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics
Modbus/DNP3 State-Based Intrusion Detection System
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Wireless Intrusion Detection System Using a Lightweight Agent
ICCNT '10 Proceedings of the 2010 Second International Conference on Computer and Network Technology
Energy efficient learning solution for intrusion detection in wireless sensor networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Abnormal human behavioral pattern detection in assisted living environments
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Quantifying resiliency and detection latency of intrusion detection structures
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Intrusion detection in SCADA networks
AIMS'10 Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security
Cyber-critical infrastructure protection using real-time payload-based anomaly detection
CRITIS'09 Proceedings of the 4th international conference on Critical information infrastructures security
State-based network intrusion detection systems for SCADA protocols: a proof of concept
CRITIS'09 Proceedings of the 4th international conference on Critical information infrastructures security
Why did my detector do that?!: predicting keystroke-dynamics error rates
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
The Research of Bayesian Classifier Algorithms in Intrusion Detection System
ICEE '10 Proceedings of the 2010 International Conference on E-Business and E-Government
IEEE Transactions on Mobile Computing
IEEE Transactions on Dependable and Secure Computing
Principles of Information Security
Principles of Information Security
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Specification based intrusion detection for unmanned aircraft systems
Proceedings of the first ACM MobiHoc workshop on Airborne Networks and Communications
Cooperating security managers: a peer-based intrusion detection system
IEEE Network: The Magazine of Global Internetworking
N-Gram against the machine: on the feasibility of the n-gram network analysis for binary protocols
RAID'12 Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses
Hi-index | 0.00 |
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As this integration deepens, the importance of securing these systems increases. In order to identify gaps and propose research directions in CPS intrusion detection research, we survey the literature of this area. Our approach is to classify modern CPS Intrusion Detection System (IDS) techniques based on two design dimensions: detection technique and audit material. We summarize advantages and drawbacks of each dimension’s options. We also summarize the most and least studied CPS IDS techniques in the literature and provide insight on the effectiveness of IDS techniques as they apply to CPSs. Finally, we identify gaps in CPS IDS research and suggest future research areas.