共 51 条
- [22] HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems [J]. CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY, 2016, : 101 - 109
- [23] Greenberg A., 2017, Wired
- [24] Haller Stephan., 2008, Future Internet - FIS, P14, DOI DOI 10.1007/978-3-642-00985-3_2
- [25] Detecting Denial-of-Service attacks using the wavelet transform [J]. COMPUTER COMMUNICATIONS, 2007, 30 (16) : 3203 - 3213
- [26] Matrix Profile V: A Generic Technique to Incorporate Domain Knowledge into Motif Discovery [J]. KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, : 125 - 134
- [27] Jyothsna V., 2011, International Journal of Computer Applications, V28, P26
- [29] Langner Ralph, 2013, TECHNICAL REPORT
- [30] Lemay A., 2016, 9 WORKSH CYB SEC EXP