[1] |
XIA Chunming, LIU Tao, WANG Huazhong, et al.Current Situation and Development Trend of Information Security in Industrial Control System[J]. Information Security and Technology, 2013, 4(2): 13-18.
|
|
夏春明,刘涛,王华忠,等. 工业控制系统信息安全现状及发展趋势[J]. 网络空间安全,2013,4(2):13-18.
|
[2] |
SADEGHI A R, WACHSMANN C, WAIDNER M.Security and Privacy Challenges in Industrial Internet of Things[C]//ACM. 2015 52nd Annual Design Automation Conference, June 7 - 11, 2015, San Francisco, California. New York: ACM, 2015: 1-6.
|
[3] |
DRIAS Z, SERHROUCHNI A, VOGEL O.Analysis of Cyber Security for Industrial Control Systems[C]//IEEE. 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, August 5-7, 2015, Shanghai, China. NJ: IEEE, 2015: 1-8.
|
[4] |
MARCO C, EMMANUELE Z, FRANK K.Sequence-aware Intrusion Detection in Industrial Control Systems[C]//ACM. The 1st ACM Workshop on Cyber-Physical System Security, March 14-April 14, 2015, Singapore. New York: ACM, 2015: 13-24.
|
[5] |
PONOMAREV S, ATKISON T.Industrial Control System Network Intrusion Detection by Telemetry Analysis[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 13(2): 252-260.
|
[6] |
TRIVEDI M.Toward Autonomic Security for Industrial Control Systems[D]. Starkville: Mississippi State University, 2015.
|
[7] |
VASILOMANOLAKIS E, SRINIVASA S, CORDERO C G, et al.Multi-stage Attack Detection and Signature Generation with ICS Honeypots[C]//IEEE. 2016 IEEE/IFIP Network Operations and Management Symposium, April 25-29, 2016, Istanbul, Turkey. NJ: IEEE, 2016: 1227-1232.
|
[8] |
PONOMAREV S, ATKISON T.Session Duration Based Feature Extraction for Network Intrusion Detection in Control System Networks[C]//IEEE. 2016 International Conference on Computational Science and Computational Intelligence, December 15-17, 2016. Las Vegas, NV, USA. NJ: IEEE, 2016: 892-896.
|
[9] |
DUNLAP S, BUTTS J, LOPEZ J, et al.Using Timing-based Side Channels for Anomaly Detection in Industrial Control Systems[J]. International Journal of Critical Infrastructure Protection, 2016, 15: 12-26.
|
[10] |
MUTHA A, TUTEJA M R R. Secure and Efficient Approach for Multilayer Cyber Security Based on Intrusion Detection System[J]. International Journal of Advent Research in Computer and Electronics, 2015, 2(2): 33-37.
|
[11] |
GAI Keke, QIU Meikang, TAO Lixin, et al.Intrusion Detection Techniques for Mobile Cloud Computing in Heterogeneous 5G[J]. Security and Communication Networks, 2016, 9(16): 3049-3058.
|
[12] |
VINAYAKUMAR R, SOMAN K P, VELAN K K S, et al. Evaluating Shallow and Deep Networks for Ransomware Detection and Classification[C]//IEEE. Sixth International Conference on Advances in Computing, Communications and Informatics(ICACCI-2017), September 13-16, 2017, Manipal, India. NJ: IEEE, 2017: 1282-1289.
|
[13] |
CASELLI M, ZAMBON E, AMANN J, et al.Specification Mining for Intrusion Detection in Networked Control Systems[C]//USENIX Association. Proceedings of the 25th USENIX Security Symposium, August 10-12, 2016, Austin, United States. Austin: USENIX, 2016: 791-806.
|
[14] |
KWON Y J, KIM H K, YONG H L, et al.A Behavior-based Intrusion Detection Technique for Smart Grid Infrastructure[C]//PowerTech. 2015 IEEE Eindhoven PowerTech, June 29 - July 2, 2015, Eindhoven, Netherlands. NJ: IEEE, 2015: 1-6.
|