共 19 条
[1]
[Anonymous], 2011, ACM S INF COMP COMM
[2]
[Anonymous], 2004, MODB APPL PROT SPEC
[3]
Barford J. K., 2002, P ACM SIGCOMM IMW FR, P71
[4]
Specification-based Intrusion Detection for Advanced Metering Infrastructures
[J].
2011 IEEE 17TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC),
2011,
:184-193
[5]
Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid
[J].
IEEE SYSTEMS JOURNAL,
2017, 11 (03)
:1644-1652
[6]
Hadziosmanovic D., 2014, P 30 ANN COMP SEC AP, P126, DOI [10.1145/2664243.2664277, DOI 10.1145/2664243.2664277]
[7]
Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges
[J].
IEEE SYSTEMS JOURNAL,
2014, 8 (04)
:1049-1059
[8]
Krotofil M., 2015, ASIACCS 2015 P 10 AC, P133, DOI DOI 10.1145/2714576.2714599
[10]
Secure Control Against Replay Attacks
[J].
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2,
2009,
:911-918