共 36 条
[4]
AnonMississippi State University Critical Infrastructure Protection Center, 2022, IND CONTR SYST CYB A
[5]
Chakraborty Sayan, 2019, 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), P523, DOI 10.1109/ICMLA.2019.00098
[6]
Chalapathy R, 2019, Arxiv, DOI [arXiv:1901.03407, DOI 10.48550/ARXIV.1901.03407]
[7]
Chang Jin., 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), P1, DOI [DOI 10.1002/14651858.CD201601, 10.1109/ICCPCT.2016.7530239]
[8]
Elmrabit N., 2020, 2020 INT C CYB SEC P, P1, DOI DOI 10.1109/CYBERSECURITY49315.2020.9138871
[9]
Farrukh Yasir Ali, 2021, 2021 North American Power Symposium (NAPS), DOI 10.1109/NAPS52732.2021.9654767
[10]
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM networks
[J].
2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN),
2017,
:261-272