트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론
Vol. 22, No. 2, pp. 267-282,
4월.
2012
10.13089/JKIISC.2012.22.2.267,
Full Text:
Keywords: self-similarity, SCADA, Intrusion Detection
Abstract Statistics
Cite this article


Keywords: self-similarity, SCADA, Intrusion Detection
Abstract Statistics
Cite this article
[IEEE Style]
P. Koh, H. Choi, S. Kim, H. Kwon, H. Kim, "Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property," Journal of The Korea Institute of Information Security and Cryptology, vol. 22, no. 2, pp. 267-282, 2012. DOI: 10.13089/JKIISC.2012.22.2.267.
[ACM Style]
Pauline Koh, Hwa-Jae Choi, Se-Ryoung Kim, Hyuk-Min Kwon, and Huy-Kang Kim. 2012. Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property. Journal of The Korea Institute of Information Security and Cryptology, 22, 2, (2012), 267-282. DOI: 10.13089/JKIISC.2012.22.2.267.