Picture for Muhammad Taha Jilani

Muhammad Taha Jilani

Attack Pattern Mining to Discover Hidden Threats to Industrial Control Systems

Add code
Aug 06, 2025
Figure 1 for Attack Pattern Mining to Discover Hidden Threats to Industrial Control Systems
Figure 2 for Attack Pattern Mining to Discover Hidden Threats to Industrial Control Systems
Figure 3 for Attack Pattern Mining to Discover Hidden Threats to Industrial Control Systems
Figure 4 for Attack Pattern Mining to Discover Hidden Threats to Industrial Control Systems
Viaarxiv icon

Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations

Add code
Feb 24, 2022
Figure 1 for Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations
Figure 2 for Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations
Figure 3 for Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations
Figure 4 for Machine Learning for Intrusion Detection in Industrial Control Systems: Applications, Challenges, and Recommendations
Viaarxiv icon

Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning

Add code
Jul 11, 2021
Figure 1 for Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning
Figure 2 for Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning
Figure 3 for Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning
Figure 4 for Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning
Viaarxiv icon