, Site officiel : http://www.scadabr.com.br/ Liste de publications IV.5 Article de revue ? Pedro Merino Laso Dataset of anomalies and malicious acts in a cyber-physical subsystem, ScadaBR est un logiciel libre qui permet le contrôle et supervision de systèmes industriels, pp.186-191, 2017.
Monitoring approach of cyberphysical systems by quality measures, IV.6 Articles de International Conference on Sensor Systems and Software, pp.105-117, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01609035
Analysis of quality measurements to categorize anomalies in sensor systems, Proceedings of computing conference 2017, pp.1330-1338, 2017. ,
Classification of phishing email using random forest machine learning technique, Journal of Applied Mathematics, issue.2 ,
A linear method for deviation detection in large databases, KDD ,
Outlier Detection and Time Series Modeling, Technometrics, vol.81, issue.2 ,
DOI : 10.1214/aos/1176350027
Cost of cyber crime study : Insights on the security investments that make a difference, 2017. ,
On abnormality detection in spuriously populated data streams, Proceedings of the 2005 SIAM International Conference on Data Mining, pp.80-91, 2005. ,
Kalman parametric and nonparametric system identification applied to echo cancellation Center for communications and signal processing, 1983. ,
A semantic model for cyber security, Proceedings of the Fifth Grid-Interop Forum. Gridwise Architectural Council, 2011. ,
Cyber-physical systems. The impact of control technology ,
, BIBLIOGRAPHIE
A survey of data mining and machine learning methods for cyber security intrusion detection, IEEE Communications Surveys & Tutorials, vol.8, issue.1 2 ,
In-network outlier detection in wireless sensor networks. Knowledge and information systems, pp.2-3 ,
Unsupervised profiling methods for fraud detection. Credit Scoring and Credit Control VII, pp.235-255, 2001. ,
Neural data mining for credit card fraud detection, Proceedings 11th International Conference on Tools with Artificial Intelligence, 1999. ,
DOI : 10.1109/TAI.1999.809773
Modeling data and process quality in multi-input, multi-output information systems, Management science, vol.31, issue.2, pp.150-162, 1985. ,
Data Quality : Concepts, Methodologies and Techniques (Data-Centric Systems and Applications).S p r i n g e r -V e r l a g, 2006. ,
Towards periodicity based anomaly detection in scada networks, Emerging Technologies & Factory Automation (ETFA), 2012 IEEE 17th Conference on, pp.1-4 ,
DOI : 10.1109/etfa.2012.6489745
, IEEE, 2012.
Flow whitelisting in scada networks, International journal of critical infrastructure protection, vol.6, issue.3, pp.150-158, 2013. ,
DOI : 10.1016/j.ijcip.2013.08.003
URL : http://vbn.aau.dk/files/168630429/index.pdf
, Practical SCADA for Industry. Newnes, 2003.
dr0wned-cyber-physical attack with additive manufacturing ,
Anomaly Detection, ACM computing surveys (CSUR), vol.4, issue.4 ,
DOI : 10.1007/s10115-006-0020-z
Detection and removal of firewall misconfiguration, Proceedings of the 2005 IASTED International Conference on Communication, Network and Information Security ,
, Center for Strategic and International Studies Net losses : Estimating the global cost of cybercrime. economic impact of cybercrime ii, 2014.
Brief application description ; visual data mining : Recognizing telephone calling fraud, Data Mining and Knowledge Discovery, vol.1, issue.2, pp.2-2 ,
Data mining and uncertain reasoning : an integrated approach, 2001. ,
Integration of selforganizing map (som) and kernel density estimation (kde) for network intrusion detection, SPIE Europe Security+ Defence, pp.74800-74800 ,
, International Society for Optics and Photonics, 2009.
Fast effective rule induction, Proceedings of the twelfth international conference on machine learning ,
, Eu transport in figures. statistical pocketbook 2016, 2016.
Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks, 11th IEEE Symposium on Computers and Communications (ISCC'06), 2006. ,
DOI : 10.1109/ISCC.2006.1691116
Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers, 2013 International Conference on Computer Communication and Informatics, pp.1-7, 2013. ,
DOI : 10.1109/ICCCI.2013.6466310
Design Rules : The power of modularity, 2000. ,
, BIBLIOGRAPHIE
The Challenges of Data Quality and Data Quality Assessment in the Big Data Era, Data Science Journal, vol.14, issue.0 ,
DOI : 10.5334/dsj-2015-002
A methodology for data quality assessment on financial data, Studies in Communication Sciences ,
Data mining and machine learning in cybersecurity, 2016. ,
DOI : 10.1201/b10867
, Direction centrale de la sécurité des systèmes d'information. Menaces sur les systèmes informatiques guide num 650, 2006.
, The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol.23, issue.143, pp.364-375, 1887.
DOI : 10.1080/14786448708628471
Improving Data Warehouse and Business Information Quality : Methods for Reducing Costs and Increasing Profits, 1999. ,
Anomaly detection over noisy data using learned probability distributions, Proceedings of the International Conference on Machine Learning.C i t e s e e r ,
, Federal Ministery of Interior Cyb er security strategy for germany, 2011.
, W32. stuxnet dossier. White paper, Symantec Corp., Security Response
Mining network data for intrusion detection through combining SVMs with ant colony networks, Future Generation Computer Systems, vol.37 ,
DOI : 10.1016/j.future.2013.06.027
Applications of kalman filtering in aerospace 1960 to the present [historical perspectives], IEEE Control Systems, vol.30, issue.3, pp.69-78, 2010. ,
A Dataset to Support Research in the Design of Secure Water Treatment Systems ,
DOI : 10.1016/S1389-1286(00)00139-0
, The 11th International Conference on Critical Information Infrastructures Security, 2016.
Automatic data quality control of observations in wireless sensor network. Geoscience and Remote Sensing Letters, IEEE, vol.12, issue.4, pp.716-720, 2015. ,
Dimensions of cyber-attacks : Cultural, social, economic, and political. Technology and Society Magazine ,
Radar/ais data fusion and sar tasking for maritime surveillance, Information Fusion 11th International Conference on, 2008. ,
Display of information for time-critical decision making, Proceedings of the Eleventh conference on Uncertainty in artificial intelligence, pp.9-9 ,
Ensemble Kalman Filtering without a Model, Physical Review X, vol.6, issue.1 ,
DOI : 10.1073/pnas.1015753108
URL : http://link.aps.org/pdf/10.1103/PhysRevX.6.011021
Robust anomaly detection using support vector machines, Proceedings of the international conference on machine learning ,
Real-time bayesian anomaly detection for environmental sensor data, Proceedings of the Congress- International Association for Hydraulic Research,v olume32,page503.Cite- seer, 2007. ,
Application of machine learning approaches in intrusion detection system : a survey, International Journal of Advanced Research in Artificial Intelligence ,
State transition analysis: a rule-based intrusion detection approach, IEEE Transactions on Software Engineering, vol.21, issue.3 ,
DOI : 10.1109/32.372146
Systems engineering handbook. A guide for system life cycle processes and activities, INCOSE, 2007. ,
, , p.95
Iec 27001 : 2005. information technology. security techniques. information security management systems. requirements, 2005. ,
Using Data Mining to Detect Health Care Fraud and Abuse: A Review of Literature, Global Journal of Health Science, vol.7, issue.1 ,
DOI : 10.5539/gjhs.v7n1p194
URL : http://www.ccsenet.org/journal/index.php/gjhs/article/download/37879/22169
The changing face of protests in the digital age : on occupying cyberspace and distributed-denial-of-services (ddos) attacks, International Review of Law Computers & Technology, vol.8, issue.2 1 ,
Automated Classification of C&C Connections Through Malware URL Clustering, IFIP International Information Security Conference, pp.2-5, 2015. ,
DOI : 10.1007/978-3-319-18467-8_17
URL : https://hal.archives-ouvertes.fr/hal-01255089
Adaptive Kalman Filtering for anomaly detection in software appliances, IEEE INFOCOM 2008, IEEE Conference on Computer Communications Workshops, pp.1-6, 2008. ,
DOI : 10.1109/INFOCOM.2008.4544581
URL : http://eprints.maynoothuniversity.ie/1751/1/HamiltonKalman.pdf
How to optimize the quality of sensor data streams ICC- GI'09. Fourth International Multi-Conference on, Computing in the Global Information Technology, 2009. ,
DOI : 10.1109/iccgi.2009.10
Representing Data Quality in Sensor Data Streaming Environments, Journal of Data and Information Quality, vol.1, issue.2, p.10, 2009. ,
DOI : 10.1145/1577840.1577845
Safety critical systems : challenges and directions, Software Engineering Proceedings of the 24rd International Conference on, 2002. ,
An approach for intrusion detection using novel gaussian based kernel function, Journal of Universal Computer Science, vol.2, issue.2 4 ,
Securing SCADA systems, 2005. ,
Hybrid kalman filter approach for aircraft engine in-flight diagnostics : Sensor fault detection case Journal of engineering for gas turbines and power, pp.7-11 ,
Information Quality : The Potential of Data and Analytics to Generate Knowledge, 2016. ,
A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems, Manufacturing Letters, vol.3, issue.2, pp.1-8 ,
DOI : 10.1016/j.mfglet.2014.12.001
Cyberattacks : Why, what, who, and how. IT professional, pp.1-4 ,
DOI : 10.1109/mitp.2009.46
Mining anomalies using traffic feature distributions, In ACM SIGCOMM Computer Communication Review, vol.5 ,
DOI : 10.1145/1080091.1080118
URL : https://open.bu.edu/bitstream/2144/1823/1/2005-002-anomaly-mining.pdf
Improved competitive learning neural networks for network intrusion and fraud detection, Neurocomputing, vol.75, issue.1, pp.135-145, 2012. ,
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors, Knowledge-Based Systems, vol.78 ,
DOI : 10.1016/j.knosys.2015.01.009
, Knowledge-based systems
Enterprise Knowledge Management. The Data Quality Approach, 2001. ,
AIMQ: a methodology for information quality assessment, Information & Management, vol.40, issue.2, pp.133-146, 2002. ,
DOI : 10.1016/S0378-7206(02)00043-5
Use of k-nearest neighbor classifier for intrusion detection. Computers & security ,
DOI : 10.1016/s0167-4048(02)00514-x
URL : http://wwwcsif.cs.ucdavis.edu/~liaoy/research/science.pdf
Information-theoretic measures for anomaly detection, Security and Privacy Proceedings. 2001 IEEE Symposium, 2001. ,
An evaluation of theories of information with regard to the semantic and pragmatic aspects of information systems, Systems Practice, vol.3, issue.July, pp.187-209, 1996. ,
DOI : 10.1007/978-1-4471-3265-3
Monitoring Approach of Cyber-Physical Systems by Quality Measures, International Conference on Sensor Systems and Software ,
DOI : 10.1002/asi.20508
URL : https://hal.archives-ouvertes.fr/hal-01609035
Analysis of quality measurements to categorize anomalies in sensor systems, 2017 Computing Conference ,
DOI : 10.1109/SAI.2017.8252263
URL : https://hal.archives-ouvertes.fr/hal-01597458
Dataset of anomalies and malicious acts in a cyber-physical subsystem, Data in Brief, vol.14, pp.186-191, 2017. ,
DOI : 10.1016/j.dib.2017.07.038
URL : https://hal.archives-ouvertes.fr/hal-01597298
, Modicon. Modbus Protocol. Reference Guide, vol.1, pp.9-9
Inside the slammer worm, IEEE Security & Privacy Magazine, vol.1, issue.4, pp.33-39, 2003. ,
DOI : 10.1109/MSECP.2003.1219056
Uncertainty management in information systems : from needs to solutions.S p r i n g e rS c i e n c e&B u s i n e s sM e d i a, pp.9-9 ,
DOI : 10.1007/978-1-4615-6245-0
Random effects logistic regression model for anomaly detection, Expert Systems with Applications, vol.37, issue.10, pp.7162-7166, 2010. ,
DOI : 10.1016/j.eswa.2010.04.017
Industrial control system simulation and data logging for intrusion detection system research ,
, 7th Annual Southeastern Cyber Security Summit. Huntsvile, AL,2 0 1 5
A novel anomaly detection approach to identify intentional AIS on-off switching, Expert Systems with Applications, vol.78, pp.110-123, 2017. ,
DOI : 10.1016/j.eswa.2017.02.011
URL : https://doi.org/10.1016/j.eswa.2017.02.011
Overview and framework for data and information quality research, Journal of Data and Information Quality (JDIQ), vol.1, issue.1 ,
, National Marine Electronics Association and others. Nmea 2000 standard for serial-data networking of marine electronic devices, 2004.
From databases to information systems-information quality makes the difference, IQ ,
Graph-based anomaly detection, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining ,
On the use of open-source firewalls in ics/scada systems Information Security Journal : A Global Perspective, pp.83-93, 2016. ,
Developing an ontology of the cyber security domain, STIDS ,
Building an ontology of cyber security, STIDS, pp.5-9, 2014. ,
Approche spatiale pour la caractérisation du contexte d'exécution d'un système d'information ubiquitaire, Arts et Métiers ParisTech. IRENav -´ Ecole Navale, 2010. ,
Taxonomy of learning. A Brief Introduction, PediaPress, 2011. ,
,
, Commun. ACM,4, vol.5, issue.4
Quality Analysis of Sensors Data for Personal Health Records on Mobile Devices ,
DOI : 10.1007/978-1-4614-4514-2_10
URL : https://hal.archives-ouvertes.fr/hal-01184500
, BIBLIOGRAPHIE
, Pervasive Health Knowledge Management, Healthcare Delivery in the Information Age, pp.103-133, 2013.
Potential cyberattacks on automated vehicles. Intelligent Transportation Systems, IEEE Transactions on, issue.99, pp.1-11, 2014. ,
DOI : 10.1109/tits.2014.2342271
The global state of information security survey 2015 -managing cyber risks in an interconnected world, p.2015 ,
The global state of information security survey 2016 -turnaround and transformation in cybersecurity, p.2016 ,
The global state of information security survey 2017 -how businesses are addressing iot risks, p.2017 ,
Information quality in information fusion, 13th Conference on, 2010. ,
Detecting Cyber Attacks On Nuclear Power Plants, Critical Infrastructure Protection II ,
DOI : 10.1007/978-0-387-88523-0_4
URL : https://link.springer.com/content/pdf/10.1007%2F978-0-387-88523-0_4.pdf
Organizing knowledge : an introduction to managing access to information, 2008. ,
Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks, 2016 11th International Conference on Availability, Reliability and Security (ARES), pp.0-1 ,
DOI : 10.1109/ARES.2016.2
,
, Communication systems 10th IEEE Singapore International Conference on, 2006.
Reliability in information fusion : literature survey, Proceedings of the seventh international conference on information fusion ,
,
t i o ns c h e m eb a s e do np r i n c i p a lc o m p o n e n tc l a s s i fi e r, 2003. ,
Cyber-physical systems : A new frontier, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.1-9, 2008. ,
DOI : 10.1007/978-0-387-88735-7_1
URL : http://www.cs.mcgill.ca/~xueliu/publications/2008_SUTC.pdf
A mathematical theory of communication, SIGMOBILE Mob. Comput. Commun. Rev, vol.5, issue.1, pp.3-55, 1948. ,
Cybersecurity for SCADA systems.P e n n w e l lb o o k s ,
Threat assessment for GPS navigation, 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings, pp.287-292, 2014. ,
DOI : 10.1109/INISTA.2014.6873632
Imperfect information : Imprecision and uncertainty. In Uncertainty management in information systems, 1997. ,
DOI : 10.1007/978-1-4615-6245-0_8
Artificial Neural Network based Intrusion Detection System: A Survey, International Journal of Computer Applications, vol.39, issue.6, pp.13-18, 2012. ,
DOI : 10.5120/4823-7074
The DaQuinCIS architecture: a platform for exchanging and improving data quality in cooperative information systems, Information Systems, vol.29, issue.7, pp.551-582, 2004. ,
DOI : 10.1016/j.is.2003.12.004
URL : http://www.dis.uniroma1.it/~midlab/articoli/SVMMB_IS.pdf
Less is More: Compact Matrix Decomposition for Large Sparse Graphs, Proceedings of the 2007 SIAM International Conference on Data Mining, pp.366-377, 2007. ,
DOI : 10.1137/1.9781611972771.33
URL : https://epubs.siam.org/doi/pdf/10.1137/1.9781611972771.33
, Sym17] Symantec. Istr. internet security threat report
Data Quality Challenges in Cyber-Physical Systems, Journal of Data and Information Quality, vol.6, issue.2-3 ,
DOI : 10.1145/2018673.2018679
,
, J. Data and Information Quality, vol.61123, issue.2-3, pp.1-11, 2015.
Information quality evaluation in fusion systems, Information Fusion (FUSION), 2013 16th International Conference on ,
URL : https://hal.archives-ouvertes.fr/hal-00846769
´ Etude dynamique de la qualité de l'information et des données d'un système d'information complexe.P h D t h e s i s , T ´ e l ´ e c o m B r e tagne, 2014. ,
, Review of maritime transport 2016, United Nations, 2016.
A product perspective on total data quality management, Communications of the ACM,4, vol.11, issue.8, pp.5-8 ,
A multinomial logistic regression modeling approach for anomaly intrusion detection, Computers & Security, vol.24, issue.8, p.4 ,
DOI : 10.1016/j.cose.2005.05.003
Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed systems ,
DOI : 10.1109/TPDS.2012.105
URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.338.1999&rep=rep1&type=pdf
Detecting intrusions using system calls: alternative data models, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.1-3, 1999. ,
DOI : 10.1109/SECPRI.1999.766910
URL : http://eprints.maynoothuniversity.ie/1418/1/DetectingIntrusions.pdf
A hybrid approach to assessing data quality, Proceedings of the 2010 international conference on information quality, pp.1-1 ,
Beyond accuracy : What data quality means to data consumers, J. Manage. Inf. Syst, vol.2, issue.1 4, pp.5-8 ,
Cyber-Physical Systems for Optimal Energy Management Scheme of Autonomous Electric Vehicle, The Computer Journal, vol.56, issue.8 ,
DOI : 10.1093/comjnl/bxt043
URL : https://academic.oup.com/comjnl/article-pdf/56/8/947/1018808/bxt043.pdf
, The Computer Journal, issue.6 8