共 50 条
[41]
A learning-based anomaly detection model of SQL attacks
[J].
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 2,
2010,
:639-642
[42]
TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM
[J].
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS),
2019,
:343-347
[44]
Anomaly Detection for Insider Threats Using Unsupervised Ensembles
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2021, 18 (02)
:1152-1164
[45]
Detection of Insider Attacks Against Interior Routing Protocols
[J].
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE,
2019,
:549-554
[47]
Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience
[J].
2016 RESILIENCE WEEK (RWS),
2016,
:140-145
[48]
Worst-Case Impact Assessment of Multi-Alarm Stealth Attacks Against Control Systems with CUSUM-Based Anomaly Detection
[J].
2023 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS, ACSOS,
2023,
:117-126