Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system
Abstract Supervisory control and data acquisition (SCADA) systems are vital in monitoring and controlling industrial processes through the web. However, while such systems result in lower costs, greater utilisation efficiency, and improved reliability, they are vulnerable to cyberattacks, with conse...
Saved in:
Main Authors: | Kuan‐Chu Lu, I‐Hsien Liu, Zong‐Chao Liu, Jung‐Shian Li |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-09-01
|
Series: | IET Networks |
Subjects: | |
Online Access: | https://doi.org/10.1049/ntw2.12127 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
An Easily Scalable Docker-Based Privacy-Preserving Malicious Traffic Detection Architecture for IoT Environments
by: Tong Niu, et al.
Published: (2024-01-01) -
Blockchain Enabled Federated Learning for Detection of Malicious Internet of Things Nodes
by: Rachid Alami, et al.
Published: (2024-01-01) -
Machine learning based intrusion detection framework for detecting security attacks in internet of things
by: V. Kantharaju, et al.
Published: (2024-12-01) -
A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles
by: Pradeep Kumar Tiwari, et al.
Published: (2025-01-01) -
A cloud‐based hybrid intrusion detection framework using XGBoost and ADASYN‐Augmented random forest for IoMT
by: Arash Salehpour, et al.
Published: (2024-12-01)