共 58 条
[1]
Adepu Sridhar, 2019, Computer Security. ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11387), P37, DOI 10.1007/978-3-030-12786-2_3
[2]
Ahmed C.M., 2020, LNCS
[4]
Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:817-831
[5]
Aoudi Wissam, 2021, 2021 AUSTR COMP SCI, P1, DOI [10.1145/3437378.3437393, DOI 10.1145/3437378.3437393]
[6]
Audibert Julien, 2020, P 26 ACM SIGKDD INT
[7]
Barbosa R.R.R., 2012, PASSIVE ACTIVE MEASU
[9]
Bishop C., 2006, Pattern Recognition and Machine Learning
[10]
Bishop C.M., 2006, PATTERN RECOGN, P27