Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion 2016
DOI: 10.1145/2908961.2908974
|View full text |Cite
|
Sign up to set email alerts
|

Evolving Attackers against Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Journal of Manufacturing Systems 47 (2018) [93][94][95][96][97][98][99][100][101][102][103][104][105][106] example, the data held in data historians' and engineers' workstations could be altered, or the network data packets could be changed causing, significant damage to the operation of the plant.…”
Section: N Tuptuk S Hailesmentioning
confidence: 99%
See 1 more Smart Citation
“…Journal of Manufacturing Systems 47 (2018) [93][94][95][96][97][98][99][100][101][102][103][104][105][106] example, the data held in data historians' and engineers' workstations could be altered, or the network data packets could be changed causing, significant damage to the operation of the plant.…”
Section: N Tuptuk S Hailesmentioning
confidence: 99%
“…This is a challenge because intrusion detection systems are typically relatively compute intensive, and we are at an early stage in the development of such techniques. See, for example, [97,98].…”
Section: Intrusion Detection Systems For Production or Process Systemsmentioning
confidence: 99%