作者: Chuadhry Mujeeb Ahmed , Gauthama Raman M R , Aditya P. Mathur
关键词:
摘要: … eter to consider while designing machine learning-based intrusion detection for ICS. … ] recommended to define the scope of an Intrusion Detection System (IDS) for the legacy IT systems. …