LEADER 00949nam0-22003131i-450- 001 990008104070403321 005 20050503164508.0 010 $a0-691-03286-6 035 $a000810407 035 $aFED01000810407 035 $a(Aleph)000810407FED01 035 $a000810407 100 $a20050503d1993----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $aa-------001yy 200 1 $aGiorgio Vasari$earchitect and courtier$fLeon Satkowski$gwith photographs by Ralph Lieberman 210 $aPrinceton$cPrinceton University press$d1993 215 $aXXIV, 176 p., [77] c. di tav.$cill.$d29 cm 610 0 $aVasari, Giorgio$aopere architettoniche 700 1$aSatkowski,$bLeon George$0294774 702 1$aVasari,$bGiorgio$f<1511-1574> 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008104070403321 952 $a06.255$b2387$fDARST 959 $aDARST 996 $aGiorgio Vasari$9754075 997 $aUNINA LEADER 02556oam 2200505 450 001 9910830869603321 005 20210531140740.0 010 $a1-119-60635-7 010 $a1-5231-3709-6 010 $a1-119-60638-1 010 $a1-119-60607-1 035 $a(CKB)4100000011659102 035 $a(MiAaPQ)EBC6424081 035 $a(EXLCZ)994100000011659102 100 $a20210531d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSCADA security $emachine learning concepts for intrusion detection and prevention /$fAbdulmohsen Almalawi [and three others] 210 1$aHoboken, New Jersey :$cJohn Wiley & Sons, Incorporated,$d[2021] 210 4$d©2021 215 $a1 online resource (219 pages) $cillustrations 311 $a1-119-60603-9 320 $aIncludes bibliographical references and index. 330 $a"This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"--$cProvided by publisher. 606 $aSupervisory control systems 606 $aAutomatic control$xSecurity measures 606 $aIntrusion detection systems (Computer security) 615 0$aSupervisory control systems. 615 0$aAutomatic control$xSecurity measures. 615 0$aIntrusion detection systems (Computer security) 676 $a629.895583 700 $aAlmalawi$b Abdulmohsen$01689074 702 $aTari$b Zahir 702 $aFahad$b Adil 702 $aYi$b Xun 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910830869603321 996 $aSCADA security$94063815 997 $aUNINA