[1] |
张文安, 洪榛, 朱俊威 ,等. 工业控制系统网络入侵检测方法综述[J]. 控制与决策, 2019,34(11): 2277-2288.
|
|
ZHANG W A , HONG Z , ZHU J W ,et al. A survey of network intrusion detection methods for industrial control systems[J]. Control and Decision, 2019,34(11): 2277-2288.
|
[2] |
LIN J , LIU L . Research on security detection and data analysis for industrial internet[C]// Proceedings of 2019 IEEE 19th International Conference on Software Quality,Reliability and Security Companion (QRSC). 2019: 466-470.
|
[3] |
KEVRIC J , JUKIC S , SUBASI A . An effective combining classifier approach using tree algorithms for network intrusion detection[J]. Neural Computing and Applications, 2017,28(1): 1051-1058.
|
[4] |
LANLAN P , LIANGYU H , ZHENGYA L . Simulation of English part-of-speech recognition based on machine learning prediction algorithm[J]. Journal of Intelligent & Fuzzy Systems, 2021,40(2): 2409-2419.
|
[5] |
OTA R , IDE T , MICHIUE T . A rapid segmentation method of cell boundary for developing embryos using machine learning with a personal computer[J]. Development,Growth & Differentiation, 2021,63(8): 406-416.
|
[6] |
ELHOSENY M . Multi-object detection and tracking (MODT) machine learning model for real-time video surveillance systems[J]. Circuits,Systems,and Signal Processing, 2020,39(2): 611-630.
|
[7] |
SETH S , SINGH G , KAUR C K . A novel time efficient learning-based approach for smart intrusion detection system[J]. Journal of Big Data, 2021,8(1): 1-28.
|
[8] |
LIANG W , LI K C , LONG J ,et al. An industrial network intrusion etection algorithm based on multi-feature data clustering optimization model[J]. IEEE Transactions on Industrial Informatics, 2019,16(3): 2063-2071.
|
[9] |
石乐义, 朱红强, 刘祎豪 ,等. 基于相关信息熵和 CNN-BiLSTM的工业控制系统入侵检测[J]. 计算机研究与发展, 2019,56(11): 2330-2338.
|
|
SHI L Y , ZHU H Q , LIU Y H ,et al. Intrusion detection of industrial control system based on correlation information entropy and CNN-BiLSTM[J]. Journal of Computer Research and Development, 2019,56(11): 2330-2338.
|
[10] |
王华忠, 程奇 . 基于改进鲸鱼算法的工控系统入侵检测研究[J]. 信息网络安全, 2021,21(2): 53-60.
|
|
WANG H Z , CHENG Q . Research on intrusion detection of industrial control system based on improved whale algorithm[J]. Netinfo Security, 2021,21(2): 53-60.
|
[11] |
LI X , ZHU M , YANG L T ,et al. Sustainable ensemble learning driving intrusion detection model[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(4): 1591-1604.
|
[12] |
LIN T Y , GOYAL P , GIRSHICK R et al . Focal loss for dense object detection[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2020,42(2): 2980-2988.
|
[13] |
宋玲玲, 王时绘, 杨超 ,等. 改进的 XGBoost 在不平衡数据处理中的应用研究[J]. 计算机科学, 2020,47(6): 98-103.
|
|
SONG L L , WANG S H , YANG C ,et al. Application research of improved XGBoost in imbalanced data processing[J]. Computer Science, 2020,47(6): 98-103.
|
[14] |
KE G , MENG Q , FINLEY T ,et al. LightGBM:a highly efficient gradient boosting decision tree[C]// Proceedings of the 31st International Conference on Neural Information Processing Systems. 2017: 3149-3157.
|
[15] |
LYU S X , ZENG Y R , WANG L . An effective fruit fly optimization algorithm with hybrid information exchange and its applications[J]. International Journal of Machine Learning and Cybernetics, 2018,9(10): 1623-1648.
|
[16] |
MORRIS T , GAO W . Industrial control system traffic data sets for intrusion detection research[C]// Proceedings of International Conference on Critical Infrastructure Protection. 2014: 65-78.
|