يعرض 1 - 20 نتائج من 25 نتيجة بحث عن 'false data processing', وقت الاستعلام: 0.05s تنقيح النتائج
  1. 1

    Partial grid false data injection attacks against state estimation حسب Margossian, Harag

    منشور في 2019
    "…The addition of an external communication layer to the power system has left it vulnerable to cyberattacks. False data injection (FDI) can be used to manipulate measurements that are used to estimate the state of the power system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2

    Modified Particle Filters for Detection of False Data Injection Attacks and State Estimation in Networked Nonlinear Systems حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2022
    "…<p>Networked control systems which transfer data over communication networks may suffer from malicious cyber attacks by injecting false data to the transferred information. …"
  3. 3

    A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems حسب Mariam Elnour (14147790)

    منشور في 2023
    "…A MATLAB/Simulink-based simulation model of the process validated with actual data from a local plant is used. …"
  4. 4

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data حسب Rajesh Kumar Dhanaraj (19646269)

    منشور في 2021
    "…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …"
  5. 5

    Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems حسب Aliya Tabassum (16896486)

    منشور في 2021
    "…Extensive experiments with standard data sets and real-time streaming IoT traffic give encouraging results.…"
  6. 6
  7. 7

    Novel Evasion Attacks Against Adversarial Training Defense for Smart Grid Federated Learning حسب Atef H. Bondok (19482352)

    منشور في 2023
    "…After that, we introduce three novel attacks, namely Distillation, No-Adversarial-Sample-Training, and False-Labeling, which can be launched during the AT process to make the global model susceptible to evasion at inference time. …"
  8. 8

    ASTER mapping of gypsum deposits of Thumrait region of southern Oman حسب Sankaran Rajendran (14152830)

    منشور في 2020
    "…<p>This study demonstrates the use of ASTER data for the mapping of gypsum deposits and associated geological formations that occurred in the Thumrait region of southern Oman. …"
  9. 9
  10. 10

    Filtering intrusion detection alarms حسب Mansour, Nashat

    منشور في 2010
    "…We present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by a NIDS. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…However, high dimensional data present a significant challenge for machine learning techniques. …"
  12. 12

    Growing hierarchical self-organizing map for filtering intrusion detection alarms حسب Mansour, Nashat

    منشور في 2008
    "…Our data mining technique is based on a Growing Hierarchical Self-Organizing Map (GHSOM) that adjusts its architecture during an unsupervised training process according to the characteristics of the input alarm data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 13
  14. 14
  15. 15

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
  16. 16
  17. 17

    DASSI: differential architecture search for splice identification from DNA sequences حسب Shabir Moosa (14153316)

    منشور في 2022
    "…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …"
  18. 18
  19. 19

    Security attacks on smart grid scheduling and their defences: a game-theoretic approach حسب M. Pilz (17975063)

    منشور في 2019
    "…The existence of a novel class of false data injection attacks that are based on modifying forecasted demand data is demonstrated, and the impact of the attacks on a typical system’s parameters is identified, using a simulated scenario. …"
  20. 20

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
    احصل على النص الكامل
    احصل على النص الكامل