SCADA security : (Record no. 69399)

000 -LEADER
fixed length control field 03900cam a22006498i 4500
001 - CONTROL NUMBER
control field on1178869780
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203628.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200618s2021 nju ob 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119606383
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119606381
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119606352
-- (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119606357
-- (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119606079
-- (adobe pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119606071
-- (adobe pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- (cloth)
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000067575294
082 00 - CLASSIFICATION NUMBER
Call Number 629.8/95583
100 1# - AUTHOR NAME
Author Almalawi, Abdulmohsen,
245 10 - TITLE STATEMENT
Title SCADA security :
Sub Title machine learning concepts for intrusion detection and prevention /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource.
490 1# - SERIES STATEMENT
Series statement Wiley series on parallel and distributed computing
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Background -- SCADA-Based Security Testbed -- Efficient k-Nearest Neighbour Approach Based on Various-Widths Clustering -- SCADA Data-Driven Anomaly Detection -- A Global Anomaly Threshold to Unsupervised Detection -- Threshold Password-Authenticated Secret Sharing Protocols -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc "This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"--
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Tari, Zahir,
700 1# - AUTHOR 2
Author 2 Fahad, Adil,
700 1# - AUTHOR 2
Author 2 Yi, Xun,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119606383
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, NJ, USA :
-- Wiley,
-- 2021.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- n
-- rdamedia
338 ## -
-- online resource
-- nc
-- rdacarrier
520 ## - SUMMARY, ETC.
-- Provided by publisher.
588 ## -
-- Description based on print version record and CIP data provided by publisher; resource not viewed.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Supervisory control systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Automatic control
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Intrusion detection systems (Computer security)
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Machine learning.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Intrusion detection systems (Computer security)
-- (OCoLC)fst01762593
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Machine learning
-- (OCoLC)fst01004795
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Supervisory control systems
-- (OCoLC)fst01139089
994 ## -
-- 92
-- DG1

No items available.