2021
DOI: 10.1109/tsusc.2019.2906657
|View full text |Cite
|
Sign up to set email alerts
|

An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
70
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 113 publications
(71 citation statements)
references
References 36 publications
1
70
0
Order By: Relevance
“…To validate the efficiency of the proposed methodology, we have compared GBFS based decision tree algorithm with four published methods, namely AdaBoost-JRIP (AdaJRIP) [25], Common Path Mining [34], [28], Expectation Maximization Clustering Technique (EMCT) [32] and Gaussian Mixture -Kalam Filter Model (GMM-KF) using Pearson Correlation Coefficient (PCC) feature selection method [35], by considering various performance evaluation factors such as whether proper pre-processing is applied or not; to accelerate the process, whether feature selection approach is incorporated or not and if applied how many features are selected to evaluate the accuracy for various output classes.…”
Section: Results Discussionmentioning
confidence: 99%
“…To validate the efficiency of the proposed methodology, we have compared GBFS based decision tree algorithm with four published methods, namely AdaBoost-JRIP (AdaJRIP) [25], Common Path Mining [34], [28], Expectation Maximization Clustering Technique (EMCT) [32] and Gaussian Mixture -Kalam Filter Model (GMM-KF) using Pearson Correlation Coefficient (PCC) feature selection method [35], by considering various performance evaluation factors such as whether proper pre-processing is applied or not; to accelerate the process, whether feature selection approach is incorporated or not and if applied how many features are selected to evaluate the accuracy for various output classes.…”
Section: Results Discussionmentioning
confidence: 99%
“…Specification-based techniques are applied for specific protocols, standalone or in combination with other methods [45], [46], [51]. More comprehensive solutions use a number of integrated techniques to detect a variety of attacks more accurately [43], [46], [48], [52], [53], [61].…”
Section: A Detection Methodology Protected Protocols and Implementamentioning
confidence: 99%
“…Keshk et al propose a privacy-preserving anomaly detection framework for protecting confidential information and discovering malicious activities in power systems networks [61]. To preserve privacy, the data pre-processing module filters and transforms original data into a new format using Pearson correlation coefficient technique.…”
Section: F Hybrid Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Passive Attacks are characterized by a lack of any alteration to information or its flow, thereby only compromising the confidentiality and privacy of communications. In some cases, a passive attack can enable location tracking of IoT devices [52][53][54]. Active Attacks involve active alteration and modification of information and its flow, but are not limited to device settings, control messages and software components.…”
Section: Iot Environmentmentioning
confidence: 99%