Detecting stealthy attacks on industrial control systems using a permutation entropy-based method.
Yan HuHong LiTom H. LuanAn YangLimin SunZhiliang WangRui WangPublished in: Future Gener. Comput. Syst. (2020)
Keyphrases
- detection method
- clustering method
- real time
- similarity measure
- computational complexity
- experimental evaluation
- high accuracy
- objective function
- prior knowledge
- significant improvement
- cost function
- segmentation method
- feature set
- optimization method
- high precision
- mathematical model
- classification accuracy
- computational cost
- wireless sensor networks
- feature selection
- neural network