共 49 条
[1]
[Anonymous], 2017, CYB TARG SAF SYST SA
[2]
[Anonymous], ARXIV150400941
[3]
[Anonymous], 2016, Wired
[4]
[Anonymous], 2016, Lecture Notes in Computer Science, DOI [10.1007/978-3-319-46493-0_38, DOI 10.1007/978-3-319-46493-0_38]
[5]
[Anonymous], 1999, Unsupervised learning: foundations of neural computation
[6]
An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications
[J].
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2,
2013,
:54-59
[7]
Cho K., 2014, ARXIV14061078, P1724, DOI 10.3115/V1/D14-1179
[8]
Gao W., 2010, 2010 ECRIME RES SUMM, P1, DOI DOI 10.1109/ECRIME.2010.5706699
[9]
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems
[J].
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY,
2016,
:101-109
[10]
A Dataset to Support Research in the Design of Secure Water Treatment Systems
[J].
CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016),
2018, 10242
:88-99