Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2025.3601381
Abstract: System intrusions, particularly Advanced Persistent Threats (APTs), pose significant threats to enterprises and organizations. Provenance graph-based attack detection and investigation methods are crucial for defending against these intrusions. To detect various attacks, security systems collect…
read more here.
Keywords:
normal behavior;
attack;
reduction;
provenance ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Instrumentation and Measurement"
DOI: 10.1109/tim.2022.3196116
Abstract: Wind turbines (WTs) are complex systems composed of multiple components. In order to assess the overall condition of a given WT, one may need to employ multiple models; such a solution, however, is deemed to…
read more here.
Keywords:
power curve;
behavior model;
wind turbines;
normal behavior ... See more keywords