共 25 条
[1]
Survey on Anomaly Detection using Data Mining Techniques
[J].
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015,
2015, 60
:708-713
[2]
Barrett Matthew P., 2018, Framework for Improving Critical Infrastructure Cybersecurity, DOI [10.6028/NIST.CSWP.04162018, DOI 10.6028/NIST.CSWP.04162018, DOI 10.1109/JPROC.2011.2165269]
[4]
CSIRO's Data61, 2013, PYTH PAILL LIB
[5]
Towards Encrypted MPC for Linear Constrained Systems
[J].
IEEE CONTROL SYSTEMS LETTERS,
2018, 2 (02)
:195-200
[10]
Communication-efficient online detection of network-wide anomalies
[J].
INFOCOM 2007, VOLS 1-5,
2007,
:134-+