408 https://doi.org/10.17993/3ctecno.2021.specialissue8.397-409
3C Tecnología. Glosas de innovación aplicadas a la pyme. ISSN: 2254 – 4143 Edición Especial Special Issue
Noviembre 2021
Journal for Science and Engineering, 42(8), 3435-3449. https://doi.org/10.1007/s13369-
017-2524-0
Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-Assisted IoT-Based SCADA Systems
Security: A Review of the State of the Art and Future Challenges. IEEE Access, 4,
1375-1384. https://doi.org/10.1109/ACCESS.2016.2549047
Selvaraj, R., Kuthadi, V. M., & Marwala, T. (2016). Honey Pot: A Major Technique
for Intrusion Detection. In Satapathy, S., Raju, K., Mandal, J., & Bhateja, V. (eds.)
Proceedings of the Second International Conference on Computer and Communication Technologies.
Advances in Intelligent Systems and Computing, vol 380. Springer, New Delhi.
https://doi.org/10.1007/978-81-322-2523-2_7
Simoes, P., Cruz, T. J., Proença, J., & Monteiro, E. (2015). Specialized Honeypots
for SCADA Systems. In Lehto, M., & Neittaanmäki, P. (eds.) Cyber Security: Analytics,
Technology and Automation, vol 78, Chapter: Part IV, Chapter 3. Springer International
Publishing. https://doi.org/10.1007/978-3-319-18302-2
Wang, L., & Jones, R. (2018). Big Data Analytics of Network Trac and Attacks. In
NAECON 2018-IEEE National Aerospace and Electronics Conference. https://ieeexplore.
ieee.org/document/8556802
Wang, W., Liu, J., Pitsilis, G., & Zhang, X. (2018). Abstracting massive data for
lightweight intrusion detection in computer networks. Information Sciences, 433-
434, 417-430. https://doi.org/10.1016/j.ins.2016.10.023
Zhang, Z., Li, J., Manikopoulos, C. N., Jorgenson, J., & Ucles, J. (2001).
HIDE: a hierarchical network intrusion detection system using statistical
preprocessing and neural network classication. Proceedings of the 2001 IEEE
Workshop on Information Assurance and Security. http://citeseerx.ist.psu.edu/viewdoc/
download?doi=10.1.1.67.857&rep=rep1&type=pdf