共 39 条
[4]
Application TRIKE Methodology When Modeling Threats to APCs Information Security
[J].
ADVANCES IN AUTOMATION III,
2022, 857
:452-461
[5]
Dan Li, 2020, 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA), P438, DOI 10.1109/ICMLA51294.2020.00075
[8]
Ding SX, 2013, ADV IND CONTROL, P3, DOI 10.1007/978-1-4471-4799-2_1
[9]
Falliere Nicolas., 2011, W32. stuxnet dossier
[10]
Time Series Anomaly Detection for Cyber-physical Systems via Neural System Identification and Bayesian Filtering
[J].
KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING,
2021,
:2858-2867