A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors
Abstract
References
Index Terms
- A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors
Recommendations
An ETH-based approach to securing industrial Internet systems against mutinous attacks
AbstractIn modern manufacturing industries, industrial components are becoming increasingly open and interconnected which significantly promotes the collaboration capability and producing efficiency on one hand, while, on the other hand, makes the ...
Towards Evolving Security Requirements of Industrial Internet: A Layered Security Architecture Solution based on Data transfer Techniques
CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced TechnologiesIndustrial Internet has been incrementally established in recent years to support smart manufacturing, which involves a collection of technology and value chain organization concepts. Along with the continuous development of the industrial Internet, an ...
Anomaly detection for mobile devices in industrial internet
UbiComp/ISWC '20 Adjunct: Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable ComputersThe concept of "Industrial Internet" was first proposed by General Electric in 2012. It aims to promote the intellectualization of the whole service system. However, with the development of the Industrial Internet, some criminals launch attacks on ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Project of Leading Talents in Science and Technology Innovation in Henan Province
- Program for Henan Province Key Science and Technology
- Henan Province University Key Scientific Research Project
- Cloud Technology Endowed Professorship
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 270Total Downloads
- Downloads (Last 12 months)270
- Downloads (Last 6 weeks)6
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in