共 50 条
[1]
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
[J].
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018),
2018,
:566-581
[2]
PRACTICAL METHOD FOR THE DIRECT ANALYSIS OF TRANSIENT STABILITY
[J].
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS,
1979, 98 (02)
:573-584
[3]
Ayad A, 2018, INNOV SMART GRID TEC
[4]
Bi SZ, 2011, IEEE GLOBE WORK, P1162, DOI 10.1109/GLOCOMW.2011.6162362
[5]
Carlini N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P513
[6]
Chakraborty A, 2018, Arxiv, DOI arXiv:1810.00069
[7]
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:648-660
[8]
Choromanska A, 2015, Arxiv, DOI arXiv:1412.0233
[9]
State Space Models for Forecasting Water Quality Variables An Application in Aquaculture Prawn Farming
[J].
KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING,
2018,
:177-185
[10]
Boosting Adversarial Attacks with Momentum
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:9185-9193