共 22 条
- [1] [Anonymous], DETECTING CYBER ATTA
- [2] Anton S. D., 2019, EVALUATION MACHINE L
- [3] Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [4] Babu B, 2017, 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), P47, DOI 10.1109/Anti-Cybercrime.2017.7905261
- [5] Chollet F., 2018, Deep Learning with Python, DOI DOI 10.1007/978-1-4842-2766-4
- [6] Dasgupta S, 2002, ADV NEUR IN, V14, P375
- [7] Davis J., 2006, P 23 INT C MACHINE L, P233, DOI [DOI 10.1145/1143844.1143874, 10.1145/1143844.1143874]
- [8] F, 2015, Keras
- [9] Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
- [10] Anomaly Detection Sensors for a Modbus-based Oil and Gas Well-monitoring System [J]. 2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 1 - 8