<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.scipedia.com/wd/index.php?action=history&amp;feed=atom&amp;title=Hindy_et_al_2019a</id>
		<title>Hindy et al 2019a - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://www.scipedia.com/wd/index.php?action=history&amp;feed=atom&amp;title=Hindy_et_al_2019a"/>
		<link rel="alternate" type="text/html" href="https://www.scipedia.com/wd/index.php?title=Hindy_et_al_2019a&amp;action=history"/>
		<updated>2026-04-25T02:23:29Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.0-wmf.10</generator>

	<entry>
		<id>https://www.scipedia.com/wd/index.php?title=Hindy_et_al_2019a&amp;diff=176247&amp;oldid=prev</id>
		<title>Scipediacontent: Scipediacontent moved page Draft Content 526443912 to Hindy et al 2019a</title>
		<link rel="alternate" type="text/html" href="https://www.scipedia.com/wd/index.php?title=Hindy_et_al_2019a&amp;diff=176247&amp;oldid=prev"/>
				<updated>2020-10-14T14:38:03Z</updated>
		
		<summary type="html">&lt;p&gt;Scipediacontent moved page &lt;a href=&quot;/public/Draft_Content_526443912&quot; class=&quot;mw-redirect&quot; title=&quot;Draft Content 526443912&quot;&gt;Draft Content 526443912&lt;/a&gt; to &lt;a href=&quot;/public/Hindy_et_al_2019a&quot; title=&quot;Hindy et al 2019a&quot;&gt;Hindy et al 2019a&lt;/a&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 14:38, 14 October 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan='2' style='text-align: center;' lang='en'&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Scipediacontent</name></author>	</entry>

	<entry>
		<id>https://www.scipedia.com/wd/index.php?title=Hindy_et_al_2019a&amp;diff=176246&amp;oldid=prev</id>
		<title>Scipediacontent: Created page with &quot; == Abstract ==  Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex proce...&quot;</title>
		<link rel="alternate" type="text/html" href="https://www.scipedia.com/wd/index.php?title=Hindy_et_al_2019a&amp;diff=176246&amp;oldid=prev"/>
				<updated>2020-10-14T14:37:59Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot; == Abstract ==  Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex proce...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc.) Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement. However, having an accurate anomaly detection system is not an easy task, due to the difficulty to differentiate between cyber-attacks and system internal failures (e.g. hardware failures). In this paper, we present a model that detects anomaly events in a water system controlled by SCADA. Six Machine Learning techniques have been used in building and evaluating the model. The model classifies different anomaly events including hardware failures (e.g. sensor failures), sabotage and cyber-attacks (e.g. DoS and Spoofing). Unlike other detection systems, our proposed work focuses on notifying the operator when an anomaly occurs with a probability of the event occurring. This additional information helps in accelerating the mitigation process. The model is trained and tested using a real-world dataset.&lt;br /&gt;
&lt;br /&gt;
Document type: Part of book or chapter of book&lt;br /&gt;
&lt;br /&gt;
== Full document ==&lt;br /&gt;
&amp;lt;pdf&amp;gt;Media:Draft_Content_526443912-beopen1058-3640-document.pdf&amp;lt;/pdf&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Original document ==&lt;br /&gt;
&lt;br /&gt;
The different versions of the original document can be found in:&lt;br /&gt;
&lt;br /&gt;
* [http://arxiv.org/abs/1904.05724 http://arxiv.org/abs/1904.05724]&lt;br /&gt;
&lt;br /&gt;
* [http://arxiv.org/pdf/1904.05724 http://arxiv.org/pdf/1904.05724]&lt;br /&gt;
&lt;br /&gt;
* [http://dx.doi.org/10.1007/978-3-030-12786-2_1 http://dx.doi.org/10.1007/978-3-030-12786-2_1]&lt;br /&gt;
&lt;br /&gt;
* [http://hdl.handle.net/10985/15039 http://hdl.handle.net/10985/15039]&lt;br /&gt;
&lt;br /&gt;
* [https://strathprints.strath.ac.uk/70936/1/Hindy_etal_CyberICPS2018_Improving_SIEM_for_critical_SCADA_water_infrastructures_using_machine_learning.pdf https://strathprints.strath.ac.uk/70936/1/Hindy_etal_CyberICPS2018_Improving_SIEM_for_critical_SCADA_water_infrastructures_using_machine_learning.pdf]&lt;/div&gt;</summary>
		<author><name>Scipediacontent</name></author>	</entry>

	</feed>