共 86 条
[51]
Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning
[J].
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017),
2017,
:1058-1065
[52]
ISA, 2020, ISA99, Industrial Automation and Control Systems Security
[54]
Kang E, 2016, 2016 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING FOR SMART CYBER-PHYSICAL SYSTEMS (SESCPS), P22, DOI [10.1145/2897035.2897041, 10.1109/SEsCPS.2016.012]
[55]
Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:787-800
[57]
Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks
[J].
CPS-SPC'18: PROCEEDINGS OF THE 2018 WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY AND PRIVACY,
2018,
:72-83
[58]
A Formal Approach to Cyber-Physical Attacks
[J].
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2017,
:436-450
[59]
Leyden John, 2016, The Register, V2016
[60]
TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems
[J].
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18),
2018,
:525-536