[1] |
YANG Ting, ZHANG Jiayuan, HUANG Zaiqi, et al. Survey of Industrial Control Systems Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1035-1053.
|
|
杨婷, 张嘉元, 黄在起, 等. 工业控制系统安全综述[J]. 计算机研究与发展, 2022, 59(5): 1035-1053.
|
[2] |
WANG Chonghua, LI Jun, CHEN Xuehong. Research on Industrial Internet Platform Security Protection[J]. Netinfo Security, 2019, 19(9): 6-10.
|
|
王冲华, 李俊, 陈雪鸿. 工业互联网平台安全防护体系研究[J]. 信息网络安全, 2019, 19(9): 6-10.
|
[3] |
HUANG Tao, WANG Zhiwei, LIU Jiachi, et al. Survey of Industrial Control Protocol Security Research[J]. Journal on Communications, 2024, 45(6): 60-74.
doi: 10.11959/j.issn.1000-436x.2024104
|
|
黄涛, 王郅伟, 刘家池, 等. 工控协议安全研究综述[J]. 通信学报, 2024, 45(6): 60-74.
doi: 10.11959/j.issn.1000-436x.2024104
|
[4] |
LAI Yingxu, YANG Kaixiang, LIU Jing, et al. Vulnerability Mining Method for Industrial Control Network Protocol Based on Fuzz Testing[J]. Computer Integrated Manufacturing Systems, 2019, 25(9): 2265-2279.
|
|
赖英旭, 杨凯翔, 刘静, 等. 基于模糊测试的工控网络协议漏洞挖掘方法[J]. 计算机集成制造系, 2019, 25(9): 2265-2279.
|
[5] |
EREZ N, WOOL A. Control Variable Classification, Modeling and Anomaly Detection in Modbus/TCP SCADA Systems[J]. International Journal of Critical Infrastructure Protection, 2015, 10: 59-70.
|
[6] |
HOLASOVA E, KUCHAR K, FUJDIAK R, et al. Security Modules for Securing Industrial Networks[C]// IEEE. 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT). New York: IEEE, 2021: 1125-1132.
|
[7] |
FU Jingqi, CAO Yifan, YI Mubai. Research on Fuzzing Test Case Generation Method Based on Gaussian Mixture Model[C]// IEEE. 2019 Chinese Control and Decision Conference (CCDC). New York: IEEE, 2019: 2674-2678.
|
[8] |
SHANG Wenling, LI Lin, WAN Min, et al. Security Defense Model of Modbus TCP Communication Based on Zone/Border Rules[EB/OL]. (2015-07-06)[2024-05-08]. https://api.semanticscholar.org/CorpusID:53410515.
|
[9] |
WEI Yiyin, CHAI Xudong. Industrial Internet Technology and Practice[M]. Beijing: Publishing House of Electronics Industry, 2021.
|
|
魏毅寅, 柴旭东. 工业互联网技术与实践[M]. 北京: 电子工业出版社, 2021.
|
[10] |
YAO Yu, ZHU Liehuang, WU Chuankun. Industraial Control Network Security Technology and Practice[M]. Beijing: China Machine Press, 2017.
|
|
姚羽, 祝烈煌, 武传坤. 工业控制网络安全技术与实践[M]. 北京: 机械工业出版社, 2017.
|
[11] |
ROSA M, OREY D C. A Trivium Curriculum for Mathematics Based on Literacy, Matheracy, and Technoracy: An Ethnomathematics Perspective[J]. ZDM, 2015, 47(4): 587-598.
|
[12] |
MAXIMOV A, BIRYUKOV A. Two Trivial Attacks on TRIVIUM[C]// Springer. Proceedings of the 14th International Conference on Selected Areas in Cryptography: LNCS 4876. Heidelberg: Springer, 2007: 36-55.
|
[13] |
XU Rongmao. Research and Implementation of Key Technologies for Security Reinforcement of Modbus TCP/IP Protocol[D]. Xi’an: Xidian University, 2017.
|
|
徐荣茂. Modbus TCP/IP协议安全加固关键技术研究与实现[D]. 西安: 西安电子科技大学, 2017.
|
[14] |
WU Yihao. Research on Data Integrity Protection Method in Industrial Control System[D]. Beijing: North China Electric Power University, 2021.
|
|
吴屹浩. 工控系统中的数据完整性保护方法研究[D]. 北京: 华北电力大学, 2021.
|
[15] |
STEVENS M, LENSTRA A, WEGER B. Chosen-Prefix Collisions for MD5 and Colliding X. 509 Certificates for Different Identities[C]// Springer. International Cryptology Conference. Heidelberg: Springer, 2007: 1-22.
|
[16] |
WANG Xiaoyun, YIN Y L, YU Hongbo. Finding Collisions in the Full SHA-1[C]// Springer. Annual International Cryptology Conference. Heidelberg: Springer, 2005: 17-36.
|
[17] |
STEVENS M, BURSZTEIN E, KARPMAN P, et al. The First Collision for Full SHA-1[C]// Springer. Annual International Cryptology Conference. Heidelberg: Springer, 2017: 570-596.
|
[18] |
DONG Qiao. Research on Information Security Protection Technology Based on Modbus/TCP Protocol[D]. Xi’an: Xi’an Polytechnic University, 2018.
|
|
董巧. 基于Modbus/TCP协议的信息安全防护技术研究[D]. 西安: 西安工程大学, 2018.
|
[19] |
BENADDI H, IBRAHIMI K, BENSLIMANE A. Improving the Intrusion Detection System for NSL-KDD Dataset Based on PCA-Fuzzy Clustering-KNN[C]// IEEE. 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM). New York: IEEE, 2018: 1-6.
|
[20] |
ZHANG Hao, CHEN Long, WEI Zhiqiang. Abnormal Traffic Detection Technology Based on Data Augmentation and Model Update[J]. Netinfo Security, 2020, 20(2): 66-74.
|
|
张浩, 陈龙, 魏志强. 基于数据增强和模型更新的异常流量检测技术[J]. 信息网络安全, 2020, 20(2): 66-74.
|
[21] |
YAN Wei, ZHANG Jun. Network Traffic Anomaly Detection Based on Time Series Analysis[J]. Journal of Jilin University (Science Edition), 2017, 55(5): 1249-1254.
|
|
闫伟, 张军. 基于时间序列分析的网络流量异常检测[J]. 吉林大学学报(理学版), 2017, 55(5): 1249-1254.
|