Author of the publication

An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems.

, , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (5): 893-906 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Taxonomy of Supervised Learning for IDSs in SCADA Environments., , , , , , , and . ACM Comput. Surv., 53 (2): 40:1-40:37 (2021)Data Summarization Techniques for Big Data - A Survey., , , , , and . Handbook on Data Centers, Springer, (2015)PPFSCADA: Privacy preserving framework for SCADA data publishing., , , , , and . Future Gener. Comput. Syst., (2014)SCADAVT-A framework for SCADA security testbed based on virtualization technology., , , and . LCN, page 639-646. IEEE Computer Society, (2013)kNNVWC: An efficient k-nearest neighbours approach based on Various-Widths Clustering., , , , and . ICDE, page 1572-1573. IEEE Computer Society, (2016)Towards an Unsupervised Feature Selection Method for Effective Dynamic Features., , , , , and . IEEE Access, (2021)Towards an architecture for managing semantic knowledge in semantic repositories., , and . Int. J. Parallel Emergent Distributed Syst., 30 (5): 411-425 (2015)An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems., , , , and . Comput. Secur., (2014)CluClas: Hybrid clustering-classification approach for accurate and efficient network classification., , , , and . LCN, page 168-176. IEEE Computer Society, (2014)Toward an efficient and scalable feature selection approach for internet traffic classification., , , , and . Comput. Networks, 57 (9): 2040-2057 (2013)