共 81 条
- [1] Jadidi Z(2016)Intelligent sampling using an optimized neural network Journal of Networks 11 16-758
- [2] Muthukkumarasamy V(2017)Flow-based web application brute-force attack and compromise detection Journal of network and systems management 25 735-89
- [3] Sithirasenan E(2018)Flow-based compromise detection: lessons learned IEEE security & privacy 16 82-38
- [4] Singh K(2014)A moving-average filter based hybrid ARIMA–ANN model for forecasting time series data Applied Soft Computing 23 27-125
- [5] Hofstede R(2018)Anomaly detection for industrial control systems using process mining Computers & Security 78 103-4369
- [6] Jonker M(2019)Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data IEEE Transactions on Industrial Informatics 15 4362-10 047
- [7] Sperotto A(2016)Phy-layer spoofing detection with reinforcement learning in wireless networks IEEE Transactions on Vehicular Technology 65 10 037-2129
- [8] Pras A(2018)Voltageids: low-level communication characteristics for automotive intrusion detection system IEEE Transactions on Information Forensics and Security 13 2114-2180
- [9] Hofstede R(2018)A method for anomalies detection in real-time ethernet data traffic applied to profinet IEEE Transactions on Industrial Informatics 14 2171-4267
- [10] Pras A(2018)Anomaly detection based on zone partition for security protection of industrial cyber-physical systems IEEE Trans Ind Electron 65 4257-121