Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems.
Emil PricopSanda Florentina MihalachePublished in: ECAI (2015)
Keyphrases
- data transfer
- critical infrastructure
- cyber attacks
- control system
- data access
- data transmission
- data flow
- cyber security
- fuzzy sets
- data acquisition
- file system
- data mining techniques
- intrusion detection
- fuzzy numbers
- smart grid
- information security
- data mining
- countermeasures
- computer networks
- intrusion detection system
- distributed systems
- knowledge discovery
- mobile devices