|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1178869780 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
200618t20212021njua ob 001 0 eng |
010 |
|
|
|a 2020027877
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d OCLCO
|d OCLCF
|d YDX
|d DG1
|d OCLCO
|d OCLCQ
|d DLC
|d YDX
|d OCLCO
|d YUS
|d OCLCO
|d IEEEE
|d OCLCQ
|d UPM
|d OCLCQ
|d OCLCA
|d SFB
|d OCLCA
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781119606383
|q electronic book
|
020 |
|
|
|a 1119606381
|q electronic book
|
020 |
|
|
|a 9781119606352
|q electronic book
|
020 |
|
|
|a 1119606357
|q electronic book
|
020 |
|
|
|a 9781119606079
|q electronic book
|
020 |
|
|
|a 1119606071
|q electronic book
|
020 |
|
|
|z 9781119606031
|q hardcover
|
024 |
8 |
|
|a 16807778
|
024 |
7 |
|
|a 10.1002/9781119606383
|2 doi
|
029 |
1 |
|
|a AU@
|b 000067575294
|
029 |
1 |
|
|a AU@
|b 000069791686
|
035 |
|
|
|a (OCoLC)1178869780
|
037 |
|
|
|a 9820846
|b IEEE
|
042 |
|
|
|a pcc
|
050 |
0 |
4 |
|a TJ222
|b .A46 2021
|
082 |
0 |
0 |
|a 629.8/95583
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Almalawi, Abdulmohsen,
|e author.
|
245 |
1 |
0 |
|a SCADA security :
|b machine learning concepts for intrusion detection and prevention : SCADA-based IDs security /
|c Abdulmohsen Almalawi, King Abdulaziz University, Zahir Tari, RMIT University, Adil Fahad, Al Baha University, Xun Yi, RMIT University.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Hoboken, NJ, USA :
|b Wiley,
|c 2021.
|
264 |
|
4 |
|c ©2021
|
300 |
|
|
|a 1 online resource (xvi, 196 pages) :
|b illustrations (chiefly color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Wiley series on parallel and distributed computing
|
505 |
0 |
|
|a Introduction -- Background -- SCADA-Based Security Testbed -- Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering -- SCADA Data-Driven Anomaly Detection -- A Global Anomaly Threshold to Unsupervised Detection -- Threshold Password-Authenticated Secret Sharing Protocols -- Conclusion.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"--
|c Provided by publisher
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on July 28, 2021).
|
590 |
|
|
|a Knovel
|b ACADEMIC - Process Design, Control & Automation
|
650 |
|
0 |
|a Supervisory control systems.
|
650 |
|
0 |
|a Automatic control
|x Security measures.
|
650 |
|
0 |
|a Intrusion detection systems (Computer security)
|
650 |
|
0 |
|a Machine learning.
|
650 |
|
6 |
|a Commande supervisée.
|
650 |
|
6 |
|a Commande automatique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Systèmes de détection d'intrusion (Sécurité informatique)
|
650 |
|
6 |
|a Apprentissage automatique.
|
650 |
|
7 |
|a Intrusion detection systems (Computer security)
|2 fast
|
650 |
|
7 |
|a Machine learning
|2 fast
|
650 |
|
7 |
|a Supervisory control systems
|2 fast
|
700 |
1 |
|
|a Tari, Zahir,
|d 1961-
|e author.
|
700 |
1 |
|
|a Fahad, Adil,
|e author.
|
700 |
1 |
|
|a Yi, Xun,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Almalawi, Abdulmohsen.
|t SCADA security.
|d Hoboken, NJ, USA : Wiley, 2021
|z 9781119606031
|w (DLC) 2020027876
|
830 |
|
0 |
|a Wiley series on parallel and distributed computing.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpSCADASM2/toc
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301802960
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17153701
|
994 |
|
|
|a 92
|b IZTAP
|