Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems.
Emil PricopSanda Florentina MihalachePublished in: CoRR (2019)
Keyphrases
- data transfer
- critical infrastructure
- cyber attacks
- control system
- data access
- data flow
- data transmission
- cyber security
- file system
- fuzzy sets
- data acquisition
- countermeasures
- intrusion detection system
- fuzzy numbers
- risk analysis
- data mining
- dos attacks
- data streams
- object oriented
- database
- computer systems
- decision support system
- data management