2021
DOI: 10.1007/s10489-021-02222-8
|View full text |Cite
|
Sign up to set email alerts
|

A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

3
7

Authors

Journals

citations
Cited by 48 publications
(7 citation statements)
references
References 43 publications
0
7
0
Order By: Relevance
“…After determining the abnormal characteristics of malicious data in wireless personal communication, the Mahalanobis distance is used to determine the similarity between the features of malicious intrusion data, which provides more powerful evidence for its mining [15]. The Markov distance is normalized to the data features in the form of covariance matrix to eliminate the interference between malicious intrusion data [16].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…After determining the abnormal characteristics of malicious data in wireless personal communication, the Mahalanobis distance is used to determine the similarity between the features of malicious intrusion data, which provides more powerful evidence for its mining [15]. The Markov distance is normalized to the data features in the form of covariance matrix to eliminate the interference between malicious intrusion data [16].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Among these, ERT achieved the best performance. A 10-fold CV was widely used for solving biological problems like phage virion proteins classification, lysine 2-hydroxyisobutyrylation identification, identification of cancer-lectins and extracellular matrix proteins, , and detection of membrane protein types. , The binary classification was performed using a confusion matrix (CM). Afterward, five performance evaluation parameters are used: accuracy (Acc), sensitivity (Sn), specificity (Sp), Mathew’s correlation coefficient (MCC), and F-measure. , These parameters are calculated as follows: Acc = TP + TN TP + FP + TN + FN Sn = TP TP + FN Sp nobreak0em.25em⁡ = TN FP + TN MCC = false( TN × TP false) false( FN × FP ) false( TP + FN false) false( TP + FP false) false( TN + FN false) false( TN + FP false) F‐measure = 2 × Precision × Recall Precision + Recall in which Precision = TP TP + …”
Section: Methodsmentioning
confidence: 99%
“…After designing a computational predictor, the performance is evaluated using different validation methods. The most employed validation schemes are jackknife and k-fold cross-validations 31 – 37 . However, jackknife approach has high cost and computational time 38 – 44 .…”
Section: Methodsmentioning
confidence: 99%