作者: Izhar Ahmed Khan , Dechang Pi , Zaheer Ullah Khan , Yasir Hussain , Asif Nawaz
DOI: 10.1109/ACCESS.2019.2925838
关键词: Intrusion detection system 、 Preprocessor 、 Data mining 、 Industrial control system 、 Benchmark (computing) 、 SCADA 、 Critical infrastructure 、 Bloom filter 、 Computer science 、 Anomaly detection
摘要: … years, and several intrusion detection systems have been … The challenge in constructing an intrusion detection … Third, we employed an edited nearest-neighbor rule algorithm to …