共 16 条
[3]
Carcano A, 2010, LECT NOTES COMPUT SC, V6027, P138
[5]
Explainable Anomaly Detection for Industrial Control System Cybersecurity
[J].
IFAC PAPERSONLINE,
2022, 55 (10)
:1183-1188
[6]
Dwyer M. B., 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002), P411, DOI 10.1109/ICSE.1999.841031
[7]
Hink RCB, 2014, INT SYMP RESIL CONTR
[9]
Konrad S, 2005, PROC INT CONF SOFTW, P372
[10]
Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems
[J].
IFAC PAPERSONLINE,
2018, 51 (24)
:1043-1050