SCADA security : (Record no. 7833)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01968cam a22002778i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251223124451.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 200618s2021 nju ob 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119606352 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119606079 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 629.8/95583 |
| 100 1# - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Almalawi, Abdulmohsen, |
| 245 10 - TITLE STATEMENT | |
| Title | SCADA security : |
| Remainder of title | machine learning concepts for intrusion detection and prevention / |
| Statement of responsibility, etc | Abdulmohsen Almalawi, King Abdulaziz University, Zahir Tari, RMIT University, Adil Fahad, Al Baha University, Xun Yi, Royal Melbourne Institute of Technology. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | 1 online resource |
| 490 0# - SERIES STATEMENT | |
| Series statement | Wiley series on parallel and distributed computing |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"-- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Supervisory control systems. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Automatic control |
| General subdivision | Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Intrusion detection systems (Computer security) |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Machine learning. |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Tari, Zahir, |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Fahad, Adil, |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Yi, Xun, |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=9820846 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | E-Books |
| Withdrawn status | Lost status | Damaged status | Home library | Current library | Date acquired | Full call number | Accession Number | Bill Date/Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|
| Indian Institute of Technology Tirupati | Indian Institute of Technology Tirupati | 23/12/2025 | 629.8/95583 | EB00792 | 23/12/2025 | E-Books |