[1] K. Randhawa, C. K. Loo, M. Seera, C. P. Lim, and A. K. Nandi, “Credit card fraud detection using AdaBoost and majority voting,” IEEE access, vol. 6, pp. 14277–14284, 2018.
[2] H. Hindy, D. Brosset, E. Bayne, A. Seeam, and X. Bellekens, “Improving SIEM for critical SCADA water infrastructures using machine learning,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11387 LNCS, pp. 3–19, 2019.
[3] S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, “Cyber security of water SCADA systems Part II: Attack detection using enhanced hydrodynamic models,” IEEE Trans. Control Syst. Technol., vol. 21, no. 5, pp. 1679–1693, 2012.
[4] S. Amin, X. Litrico, S. Sastry, and A. M. Bayen, “Cyber security of water SCADA systems Part I: Analysis and experimentation of stealthy deception attacks,” IEEE Trans. Control Syst. Technol., vol. 21, no. 5, pp. 1963–1970, 2012.
[5] R. Mitchell and I.-R. Chen, “A survey of intrusion detection techniques for cyber-physical systems,” ACM Comput. Surv., vol. 46, no. 4, p. 55, 2014.
[6] L. Cheng, K. Tian, and D. D. Yao, “Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks,” in Proceedings of the 33rd Annual Computer Security Applications Conference, 2017, pp. 315–326.
[7] A. Mathur, “On The Limits of Detecting Process Anomalies in Critical Infrastructure,” in Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018, pp. 1–1.
[8] “Simple guide to confusion matrix terminology.” [Online]. Available: https://www.dataschool.io/simple-guide-to-confusion-matrix-terminology/. [Accessed: 19-May-2019].
[9] K. Sheppard, “Introduction to python for econometrics, statistics and data analysis,” Self-published, Univ. Oxford, version, vol. 2, 2012.
[10] P. M. Laso, D. Brosset, and J. Puentes, “Dataset of anomalies and malicious acts in a cyber-physical subsystem,” Data Br., vol. 14, pp. 186–191, 2017.