A process control approach to cyber attack detection. Ye, N, Giordano, J, & Feldman, J Communications of the ACM, 2001. Paper bibtex @article{Approach,
author = {Ye, N and Giordano, J and Feldman, J},
journal = {Communications of the ACM},
title = {{A process control approach to cyber attack detection}},
url = {http://portal.acm.org/citation.cfm?id=381641.381662},
year = {2001}
}
Downloads: 0
{"_id":{"_str":"535ed25b97e559e821000538"},"__v":0,"authorIDs":[],"author_short":["Ye, N","Giordano, J","Feldman, J"],"bibbaseid":"ye-giordano-feldman-aprocesscontrolapproachtocyberattackdetection-2001","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Ye"],"firstnames":["N"],"suffixes":[]},{"propositions":[],"lastnames":["Giordano"],"firstnames":["J"],"suffixes":[]},{"propositions":[],"lastnames":["Feldman"],"firstnames":["J"],"suffixes":[]}],"journal":"Communications of the ACM","title":"A process control approach to cyber attack detection","url":"http://portal.acm.org/citation.cfm?id=381641.381662","year":"2001","bibtex":"@article{Approach,\nauthor = {Ye, N and Giordano, J and Feldman, J},\njournal = {Communications of the ACM},\ntitle = {{A process control approach to cyber attack detection}},\nurl = {http://portal.acm.org/citation.cfm?id=381641.381662},\nyear = {2001}\n}\n","author_short":["Ye, N","Giordano, J","Feldman, J"],"key":"Approach","id":"Approach","bibbaseid":"ye-giordano-feldman-aprocesscontrolapproachtocyberattackdetection-2001","role":"author","urls":{"Paper":"http://portal.acm.org/citation.cfm?id=381641.381662"},"downloads":0},"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/14215034/bibs/bibs/A-List-bb.bib","downloads":0,"keywords":[],"search_terms":["process","control","approach","cyber","attack","detection","ye","giordano","feldman"],"title":"A process control approach to cyber attack detection","year":2001,"dataSources":["jGrSs2aYARmRcupKy"]}