Please use this identifier to cite or link to this item: http://dspace.uniten.edu.my/jspui/handle/123456789/13030
DC FieldValueLanguage
dc.contributor.authorQassim, Q.en_US
dc.contributor.authorAhmad, A.R.en_US
dc.contributor.authorIsmail, R.en_US
dc.contributor.authorAbu Bakar, A.en_US
dc.contributor.authorAbdul Rahim, F.en_US
dc.contributor.authorMokhtar, M.Z.en_US
dc.contributor.authorRamli, R.en_US
dc.contributor.authorMohd Yusof, B.en_US
dc.contributor.authorMahdi, M.N.en_US
dc.date.accessioned2020-02-03T03:29:54Z-
dc.date.available2020-02-03T03:29:54Z-
dc.date.issued2019-
dc.description.abstractThe increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf (COTS) products, as well as open communication protocols, made them attractive targets to various threat agents including cyber-criminals, national-state, and cyber-terrorists. Given that, today's ICSs are deriving the most critical national infrastructures. Therefore, this raises tremendous needs to secure these systems against cyber-attacks. Intrusion detection technology has been considered as one of the most essential security precautions for ICS networks. It can effectively detect potential cyber-attacks and malicious activities and prevent catastrophic consequences. This paper puts forward a new method to detect malicious activities at the ICS net-works. © 2019 IEEE.en_US
dc.language.isoenen_US
dc.titleAn Anomaly Detection Technique for Deception Attacks in Industrial Control Systemsen_US
dc.typeConference Paperen_US
dc.identifier.doi10.1109/BigDataSecurity-HPSC-IDS.2019.00057-
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:UNITEN Scholarly Publication
Files in This Item:
File SizeFormat 
An Anomaly Detection Technique for Deception.pdf515.77 kBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.