Brenner et al., 2023
ViewPDF| Publication | Publication Date | Title | 
|---|---|---|
| US12363157B2 (en) | Cyber security appliance for an operational technology network | |
| Rakas et al. | A review of research work on network-based scada intrusion detection systems | |
| US20230095415A1 (en) | Helper agent and system | |
| AU2021275768A1 (en) | Cyber security for instant messaging across platforms | |
| Jardine et al. | Senami: Selective non-invasive active monitoring for ics intrusion detection | |
| Mukhopadhyay et al. | A comparative study of related technologies of intrusion detection & prevention systems | |
| Brenner et al. | Better safe than sorry: Risk management based on a safety-augmented network intrusion detection system | |
| Evesti et al. | Cybersecurity situational awareness taxonomy | |
| Briesemeister et al. | Detection, correlation, and visualization of attacks against critical infrastructure systems | |
| CN118018231A (en) | Security policy management method, device, equipment and storage medium for isolation area | |
| Younus et al. | A survey on network security monitoring: tools and functionalities | |
| Choi et al. | Detecting cybersecurity threats for industrial control systems using machine learning | |
| Ramkumar et al. | Diagnosing unknown attacks in smart homes using abductive reasoning | |
| Angséus et al. | Network-based intrusion detection systems for industrial control systems | |
| Xu et al. | AI and machine learning for the analysis of data flow characteristics in industrial network communication security | |
| Pranggono et al. | Intrusion detection systems for critical infrastructure | |
| Fournaris et al. | Design and run-time aspects of secure cyber-physical systems | |
| Alrehaili et al. | An attack scenario reconstruction approach using alerts correlation and a dynamic attack graph | |
| Bhattacharjee et al. | Fuzzy Approach for Intrusion Detection System: A Survey. | |
| Siraj et al. | A cognitive model for alert correlation in a distributed environment | |
| Heigl et al. | Incident reaction based on intrusion detections’ alert analysis | |
| Alim et al. | IDSUDA: An Intrusion Detection System Using Distributed Agents | |
| Rimsha et al. | The problem of selecting APCS’information security tools | |
| STANCIU et al. | A Review of Machine Learning Techniques for the Cybersecurity of Critical Infrastructures | |
| Trivedi | Toward autonomic security for industrial control systems |