共 47 条
[2]
Abokifa AA, 2017, WORLD ENVIRONMENTAL AND WATER RESOURCES CONGRESS 2017: HYDRAULICS AND WATERWAYS AND WATER DISTRIBUTION SYSTEMS ANALYSIS, P676
[3]
Abrams M, 2008, MITRE CORP US WWW MI
[4]
WaterJam: An Experimental case study of Jamming Attacks on a Water Treatment System
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C),
2017,
:341-347
[5]
Ahmed C. M., 2017, P 3 INT WORKSH CYB P, P25, DOI 10.1145/3055366.3055375
[6]
Ali A., Restricted Boltzmann Machine
[8]
Passive Inference of Attacks on SCADA Communication Protocols
[J].
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC),
2016,
:62-67
[9]
Chandy SE, 2017, WORLD ENVIRONMENTAL AND WATER RESOURCES CONGRESS 2017: HYDRAULICS AND WATERWAYS AND WATER DISTRIBUTION SYSTEMS ANALYSIS, P611
[10]
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
[J].
34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019),
2019,
:962-973