Author of the publication

Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique.

, , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2625-2638 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deceptive jamming discrimination based on range-angle localization of a frequency diverse array., , , and . Frontiers Inf. Technol. Electron. Eng., 18 (9): 1437-1446 (2017)Scanner-Hunter: An Effective ICS Scanning Group Identification System., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Study on the intelligent honeynet model for containing the spread of industrial viruses., , , , and . Comput. Secur., (2021)Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2625-2638 (September 2023)Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network., , , and . IEEE Access, (2020)Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 466-473. IEEE, (2020)A scheduling method based on a hybrid genetic particle swarm algorithm for multifunction phased array radar., , , , and . Frontiers Inf. Technol. Electron. Eng., 18 (11): 1806-1816 (2017)A cyber-physical model for SCADA system and its intrusion detection., , , and . Comput. Networks, (2021)Learning to Impute: A General Framework for Semi-supervised Learning., , and . CoRR, (2019)Hawkeye: Finding spamming accounts., , , , , and . APNOMS, page 1-4. IEEE, (2014)