[1] |
JIN Zhongfeng, LI Nan, LIU Chao, et al. Overview of Research on Intrusion Detection Technology of Industrial Control System[J]. Confidential Science and Technology, 2018,90(3): 20-27.
|
|
金忠峰, 李楠, 刘超, 等. 工业控制系统入侵检测技术研究综述[J]. 保密科学技术, 2018,90(3): 20-27.
|
[2] |
CASELLI M, ZAMBON E, KARGL F. Sequence-aware Intrusion Detection in Industrial Control Systems[C]//I2R-ADSC. 1st ACM Workshop on Cyber-physical System Security, April 14, 2015, Singapore Republic of Singapore. New York: ACM, 2015: 13-24.
|
[3] |
SONG Zhanwei, LIU Zenghui. Abnormal Detection Method of Industrial Control System Based on Behavior Model[J]. Computers and Security, 2019,84(3): 166-178.
|
[4] |
QASSIM Q S, ZIN A M, AZIZ M J A. Anomalies Classification Approach for Network-based Intrusion Detection System[J]. International Journal of Network Security, 2016,18(6): 1159-1172.
|
[5] |
ALJAWARNEH S, ALDWAIRI M, YASSEIN M B. Anomaly-based Intrusion Detection System Through Feature Selection Analysis and Building Hybrid Efficient Model[J]. Journal of Computational Science, 2018,25(3): 152-160.
|
[6] |
WANG Linlin, LIU Jinghao, FU Xiaomei. An Intrusion Detection Method Based on Extreme Learning Machine and Modified K-means[J]. Computer Engineering and Science, 2018,40(8): 1398-1404.
|
|
王琳琳, 刘敬浩, 付晓梅. 基于极限学习机与改进K-means算法的入侵检测方法[J]. 计算机工程与科学, 2018,40(8): 1398-1404.
|
[7] |
MAZINI M, SHIRAZI B, MAHDAVI I. Anomaly Network-based Intrusion Detection System Using A Reliable Hybrid Artificial Bee Colony and AdaBoost Algorithms[J]. Journal of King Saud University: Computer and Information Sciences, 2018,31(4): 541-553.
|
[8] |
CHENG Dongmei, YAN Biao, WEN Hui, et al. The Design and Implement of Rule Matching-based Distributed Intrusion Detection Framework for Industry Control System[J]. Netinfo Security, 2017,17(7): 45-51.
|
[9] |
CHEN Wanzhi, LIU Tianjiao, TANG Yuxu, et al. Multi-level Adaptive Coupled Method for Industrial Control Networks Safety Based on Machine Learning[J]. Safety Science, 2019,120(7): 268-275.
|
[10] |
SHANG Wenli, ZENG Peng, WAN Ming, et al. Intrusion Detection Algorithm Based on OCSVM in Industrial Control System[J]. Security and Communication Networks, 2016,9(10): 1040-1049.
|
[11] |
CHEN Hanyu, WANG Huazhong, YAN Bingyong. Application of SVM Based on CUDA and Cuckoo Algorithm in Industrial Control Intrusion Detection[J]. Journal of East China University of Science and Technology(Natural Science Edition), 2019,45(1): 101-109.
|
|
陈汉宇, 王华忠, 颜秉勇. 基于CUDA和布谷鸟算法的SVM在工控入侵检测中的应用[J]. 华东理工大学学报(自然科学版), 2019,45(1): 101-109.
|
[12] |
YANG Zhihui, WANG Huazhong, YAN Bingyong. Research on Intrusion Detection based on Improved Particle Swarm Optimization SVM[J]. Journal of Guangxi University(Natural Science Edition), 2016,41(3): 779-785.
|
[13] |
IKRAM S T, CHERUKURI A K. Improving Accuracy of Intrusion Detection Model Using PCA and Optimized SVM[J]. Journal of Computing and Information Technology, 2016,24(2): 133-148.
|
[14] |
MIRJALILI S, LEWIS A. The Whale Optimization Algorithm[J]. Advances in Engineering Software, 2016,95(1): 51-67.
|
[15] |
SALGOTRA R, SINGH U. Application of Mutation Operators to Flower Pollination Algorithm[J]. Expert Systems with Applications, 2017,79(2): 112-129.
|
[16] |
DUAN Jie, HU Qinghua, ZHANG Lingjun, et al. Multi-label Classification Feature Selection Algorithm Based on Neighborhood Rough Set[J]. Journal of Computer Research and Development, 2015,52(1): 56-65.
|
|
段洁, 胡清华, 张灵均, 等. 基于邻域粗糙集的多标记分类特征选择算法[J]. 计算机研究与发展, 2015,52(1): 56-65.
|
[17] |
NADER P, HONEINE P, BEAUSEROY P. One-class Classification for Intrusion Detection in SCADA Systems[J]. IEEE Transactions on Industrial Informatics, 2014,10(4): 2308-2317.
doi: 10.1109/TII.2014.2330796
URL
|