Cargando…

SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security /

"This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors d...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Almalawi, Abdulmohsen (Autor), Tari, Zahir, 1961- (Autor), Fahad, Adil (Autor), Yi, Xun (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ, USA : Wiley, 2021.
Edición:First edition.
Colección:Wiley series on parallel and distributed computing.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 KNOVEL_on1178869780
003 OCoLC
005 20231027140348.0
006 m o d
007 cr |||||||||||
008 200618t20212021njua ob 001 0 eng
010 |a  2020027877 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d OCLCO  |d OCLCF  |d YDX  |d DG1  |d OCLCO  |d OCLCQ  |d DLC  |d YDX  |d OCLCO  |d YUS  |d OCLCO  |d IEEEE  |d OCLCQ  |d UPM  |d OCLCQ  |d OCLCA  |d SFB  |d OCLCA  |d OCLCQ  |d OCLCO 
020 |a 9781119606383  |q electronic book 
020 |a 1119606381  |q electronic book 
020 |a 9781119606352  |q electronic book 
020 |a 1119606357  |q electronic book 
020 |a 9781119606079  |q electronic book 
020 |a 1119606071  |q electronic book 
020 |z 9781119606031  |q hardcover 
024 8 |a 16807778 
024 7 |a 10.1002/9781119606383  |2 doi 
029 1 |a AU@  |b 000067575294 
029 1 |a AU@  |b 000069791686 
035 |a (OCoLC)1178869780 
037 |a 9820846  |b IEEE 
042 |a pcc 
050 0 4 |a TJ222  |b .A46 2021 
082 0 0 |a 629.8/95583  |2 23 
049 |a UAMI 
100 1 |a Almalawi, Abdulmohsen,  |e author. 
245 1 0 |a SCADA security :  |b machine learning concepts for intrusion detection and prevention : SCADA-based IDs security /  |c Abdulmohsen Almalawi, King Abdulaziz University, Zahir Tari, RMIT University, Adil Fahad, Al Baha University, Xun Yi, RMIT University. 
250 |a First edition. 
264 1 |a Hoboken, NJ, USA :  |b Wiley,  |c 2021. 
264 4 |c ©2021 
300 |a 1 online resource (xvi, 196 pages) :  |b illustrations (chiefly color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Wiley series on parallel and distributed computing 
505 0 |a Introduction -- Background -- SCADA-Based Security Testbed -- Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering -- SCADA Data-Driven Anomaly Detection -- A Global Anomaly Threshold to Unsupervised Detection -- Threshold Password-Authenticated Secret Sharing Protocols -- Conclusion. 
504 |a Includes bibliographical references and index. 
520 |a "This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"--  |c Provided by publisher 
588 |a Description based on online resource; title from digital title page (viewed on July 28, 2021). 
590 |a Knovel  |b ACADEMIC - Process Design, Control & Automation 
650 0 |a Supervisory control systems. 
650 0 |a Automatic control  |x Security measures. 
650 0 |a Intrusion detection systems (Computer security) 
650 0 |a Machine learning. 
650 6 |a Commande supervisée. 
650 6 |a Commande automatique  |x Sécurité  |x Mesures. 
650 6 |a Systèmes de détection d'intrusion (Sécurité informatique) 
650 6 |a Apprentissage automatique. 
650 7 |a Intrusion detection systems (Computer security)  |2 fast 
650 7 |a Machine learning  |2 fast 
650 7 |a Supervisory control systems  |2 fast 
700 1 |a Tari, Zahir,  |d 1961-  |e author. 
700 1 |a Fahad, Adil,  |e author. 
700 1 |a Yi, Xun,  |e author. 
776 0 8 |i Print version:  |a Almalawi, Abdulmohsen.  |t SCADA security.  |d Hoboken, NJ, USA : Wiley, 2021  |z 9781119606031  |w (DLC) 2020027876 
830 0 |a Wiley series on parallel and distributed computing. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpSCADASM2/toc  |z Texto completo 
938 |a YBP Library Services  |b YANK  |n 301802960 
938 |a YBP Library Services  |b YANK  |n 17153701 
994 |a 92  |b IZTAP