Handbook of Information and Communication Security 2010
DOI: 10.1007/978-3-642-04117-4_38
|View full text |Cite
|
Sign up to set email alerts
|

Technological and Legal Aspects of CIS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 12 publications
0
13
0
Order By: Relevance
“…Then, the entire signal acquired for each particle and condition was split into epochs of 2 s. The z-score of each 2 s signal portion was computed in order to remove noisy signal epochs. Independently of the type of features used in this kind of problems, it is important that their raw signals have as higher signal-to-noise ratio (SNR) as possible [ 44 , 45 , 46 ]. 2 s z-scored signal portions which, in magnitude, exceeded the threshold value of 5 were therefore discarded.…”
Section: Methodsmentioning
confidence: 99%
“…Then, the entire signal acquired for each particle and condition was split into epochs of 2 s. The z-score of each 2 s signal portion was computed in order to remove noisy signal epochs. Independently of the type of features used in this kind of problems, it is important that their raw signals have as higher signal-to-noise ratio (SNR) as possible [ 44 , 45 , 46 ]. 2 s z-scored signal portions which, in magnitude, exceeded the threshold value of 5 were therefore discarded.…”
Section: Methodsmentioning
confidence: 99%
“…A traffic mining–based intrusion detection method proposed by Stavroulakis and Stamp 20 extracts five tuples (source IP address, destination IP address, transport-layer protocol, source port, destination port), the traffic duration, and the average time interval between adjacent packets from the collected traffic data. Then the data mining technology is employed to distinguish the abnormal behaviors from the normal behaviors of the system and finally detect a variety of intrusions such as Replay, Denial of Service (DoS), Man-in-the-Middle, and Packet Tampering.…”
Section: New Taxonomy Of Ics Idsmentioning
confidence: 99%
“…However, encryption itself is not effective enough where a malicious attacker can perform traffic analysis on the overheard cipher text, which could release sensitive information from the data. Moreover, to avoid the exploit of information, confidentiality of sensed data in smart grids also must be applied by access control policies [10,11,15]. Furthermore, to maintain the confidentiality in smart grids, secure channels should be built into the network.…”
Section: A Security Requirementsmentioning
confidence: 99%
“…Furthermore, to maintain the confidentiality in smart grids, secure channels should be built into the network. Also, public node information such as node identities must be encrypted to some extent to defend against traffic analysis attacks [15]. Compromising a node physically becomes a problem of data confidentiality, whereas, a malicious user physically captures a node, it is generally expected that the adversary can obtain all data from that node such as reading meter data or customers' data.…”
Section: A Security Requirementsmentioning
confidence: 99%