共 90 条
- [1] Agostin A., DEFENSE DEPTH SECURE
- [2] [Anonymous], 2019, 2019 INT C CREATIVE, DOI DOI 10.1109/CREBUS.2019.8840089
- [3] [Anonymous], IEEE T NETW SCI ENG
- [4] [Anonymous], 2011, Proceedings of the 6th ACM symposium on information, computer and communications security
- [5] Bagaria S., 2011, 2011 International Conference on Recent Trends in Information Systems (ReTIS), P293, DOI 10.1109/ReTIS.2011.6146884
- [6] Beal MJ, 2002, ADV NEUR IN, V14, P577
- [7] An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications [J]. 2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2, 2013, : 54 - 59
- [8] Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness [J]. 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 341 - +
- [9] KingFisher: an Industrial Security Framework based on Variational Autoencoders [J]. SENSYS-ML'19: PROCEEDINGS OF THE FIRST WORKSHOP ON MACHINE LEARNING ON EDGE IN SENSOR SYSTEMS, 2019, : 7 - 12
- [10] Bratus S., 2008, 634 DARM COLL