ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
13
views
0
references
Top references
cited by
8
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,801
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems
Author(s):
Eirini Anthi
,
Lowri Williams
,
Matilda Rhode
,
Pete Burnap
,
Adam Wedgbury
,
E. Anthi
,
L. WILLIAMS
,
M. RHODE
,
L Williams
,
M. Rhode
,
P. Burnap
,
A. Wedgbury
Publication date:
2021
Journal:
Journal of Information Security and Applications
Read this article at
ScienceOpen
Publisher
Further versions
open (via crossref license)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH title and first author match)
Powered by
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Behavioral phenotypization of a mouse model for Alzheimer's: PDAPP = Tg(APPV717F)109Ili
Author and article information
Journal
DOI::
10.1016/j.jisa.2020.102717
ScienceOpen disciplines:
Neurosciences
Data availability:
ScienceOpen disciplines:
Neurosciences
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,801
A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation
Authors:
Stefan Marksteiner
,
Peter Priller
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities
Authors:
Will Serrano
Friction, snake oil, and weird countries: Cybersecurity systems could deepen global inequality through regional blocking
Authors:
Anne Jonas
,
Jenna Burrell
See all similar
Cited by
7
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
Authors:
Giovanni Apruzzese
,
Mauro Andreolini
,
Luca Ferretti
…
When Deep Learning-Based Soft Sensors Encounter Reliability Challenges: A Practical Knowledge-Guided Adversarial Attack and Its Defense
Authors:
Runyuan Guo
,
Han Liu
,
Ding Liu
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Authors:
Abigail M. Y. Koay
,
Ryan K. L Ko
,
Hinne Hettema
…
See all cited by