Whitelist-Based Anomaly Detection for Industrial Control System Security
Vol. 38, No. 8, pp. 641-653, Aug. 2013
PDF Full-Text
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
H. Yoo, J. Yun, T. Shon, "Whitelist-Based Anomaly Detection for Industrial Control System Security," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 8, pp. 641-653, 2013. DOI: .
[ACM Style]
Hyunguk Yoo, Jeong-Han Yun, and Taeshik Shon. 2013. Whitelist-Based Anomaly Detection for Industrial Control System Security. The Journal of Korean Institute of Communications and Information Sciences, 38, 8, (2013), 641-653. DOI: .
[KICS Style]
Hyunguk Yoo, Jeong-Han Yun, Taeshik Shon, "Whitelist-Based Anomaly Detection for Industrial Control System Security," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 8, pp. 641-653, 8. 2013.