2013
DOI: 10.1016/j.procs.2013.09.154
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Cyber-attacks with Zone Dividing and PCA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…PCA is an effective technique in data compression and feature extraction. In Feature selection process information space is converted into a feature space, which has a lower dimension [11,15,16].…”
Section: Feature Extraction 241 Principal Component Analysis (Pca)mentioning
confidence: 99%
“…PCA is an effective technique in data compression and feature extraction. In Feature selection process information space is converted into a feature space, which has a lower dimension [11,15,16].…”
Section: Feature Extraction 241 Principal Component Analysis (Pca)mentioning
confidence: 99%
“…Machine learning algorithms are used to design such a detection system to detect any concealed cyber‐attacks. Morita et al () have proposed an automatic detection system based on machine learning techniques. In order to carry out the experiment, a simple plant was considered and calibrated in which the hot water is circulated between two tanks that vary in heights.…”
Section: Applications Of Machine Learning In Cybersecuritymentioning
confidence: 99%
“…It introduced a qualitative method on the anomaly analysis through the information in other normal zones. Then, this team proposed a quantitative method that was based on principle component analysis (PCA) to detect the anomalies on their testbed [10]. Mechtri et al [11] used the PCA algorithm to reduce data dimension in their anomaly detection method for network communications.…”
Section: A Security Protection For Field Zonesmentioning
confidence: 99%