2
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems

      , , , , ,
      Computers & Security
      Elsevier BV

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references52

          • Record: found
          • Abstract: not found
          • Article: not found

          A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Industrial Control Systems: Cyberattack trends and countermeasures

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Detection of advanced persistent threat using machine-learning correlation analysis

                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                (View ORCID Profile)
                Journal
                Computers & Security
                Computers & Security
                Elsevier BV
                01674048
                November 2023
                November 2023
                : 134
                : 103445
                Article
                10.1016/j.cose.2023.103445
                e27f44c5-d881-453c-a4c2-7c3c4c9f53f6
                © 2023

                https://www.elsevier.com/tdm/userlicense/1.0/

                https://doi.org/10.15223/policy-017

                https://doi.org/10.15223/policy-037

                https://doi.org/10.15223/policy-012

                https://doi.org/10.15223/policy-029

                https://doi.org/10.15223/policy-004

                History

                Comments

                Comment on this article