共 21 条
[1]
Yang A., Sun L., Wang X., Et al., Intrusion detection techniques for industrial control system, Journal of Computer Research and Development, 53, 9, pp. 2039-2054, (2016)
[2]
Akbanov M., Vassilakis V.G., Logothetis M.D., Ransomware detection and mitigation using software-defined networking: The case of WannaCry, Computers & Electrical Engineering, 76, pp. 111-121, (2019)
[3]
Dong H., Peng D., Research on abnormal detection of ModbusTCP/IP protocol based on one-class SVM, Proc of the 33rd Youth Academic Annual Conf of Chinese Association of Automation (YAC), pp. 398-403, (2018)
[4]
Eigner O., Kreimel P., Tavolato P., Detection of man-in-the-middle attacks on industrial control networks, Proc of the 5th IEEE Int Conf on Software Security and Assurance (ICSSA), pp. 64-69, (2016)
[5]
Singh V.K., Govindarasu M., Decision tree based anomaly detection for remedial action scheme in smart grid using PMU data, Proc of the 8th IEEE Power & Energy Society General Meeting (PESGM), pp. 1-5, (2018)
[6]
Li Y., Zhang J., Pan D., Et al., A study of speech recognition based on RNN-RBM language model, Journal of Computer Research and Development, 51, 9, pp. 1936-1944, (2014)
[7]
Wang Y., Zhuo Y., Wu Y., Et al., Question answering algorithm on image fragmentation information based on deep neural network, Journal of Computer Research and Development, 55, 12, pp. 2600-2610, (2018)
[8]
Cambria E., Poria S., Hazarika D., Et al., SenticNet 5: Discovering conceptual primitives for sentiment analysis by means of context embeddings, Proc of the 32nd AAAI Conf on Artificial Intelligence, pp. 1795-1802, (2018)
[9]
Tang T.A., Mhamdi L., McLernon D., Et al., Deep learning approach for network intrusion detection in software defined networking, Proc of 2016 Int Conf on Wireless Networks and Mobile Communications, pp. 258-263, (2016)
[10]
Yu B., Wang H., Yan B., Intrusion detection of industrial control system based on long short term memory, Information and Control, 47, 1, pp. 54-59, (2018)