共 37 条
- [1] Basseville M., 2002, ROBOTICS AUTOMATION, VXVI, P130
- [2] Malware Similarity Identification Using Call Graph Based System Call Subsequence Features [J]. 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 6 - 10
- [4] A three-stage analysis of IDS for critical infrastructures [J]. COMPUTERS & SECURITY, 2015, 55 : 235 - 250
- [8] Crdenas A. A., 2009, WORKSH FUT DIR CYB S
- [9] A Cloud-based Architecture for the Internet of Things targeting Industrial Devices Remote Monitoring and Control [J]. IFAC PAPERSONLINE, 2016, 49 (30): : 108 - 113