[1] |
梁耀, 冯冬芹, 徐珊珊 ,等. 加密传输在工控系统安全中的可行性研究[J]. 自动化学报, 2018,44(3): 434-442.
|
|
LIANG Y , FENG D Q , XU S S ,et al. Feasibility analysis of encrypted transmission on security of industrial control systems[J]. Acta Automatica Sinica, 2018,44(3): 434-442.
|
[2] |
BABU B , IJYAS T , MUNEER P ,et al. Security issues in SCADA based industrial control systems[C]// International Conference on Anti-cyber Crimes. Piscataway:IEEE Press, 2017.
|
[3] |
陆耿虹, 冯冬芹 . 基于粒子滤波的工业控制网络态势感知建模[J]. 自动化学报, 2018,44(8): 1405-1412.
|
|
LU G H , FENG D Q . Modeling of industrial control network situation awareness with particle filtering[J]. Acta Automatica Sinica, 2018,44(8): 1405-1412.
|
[4] |
李俊, 郭娴, 孙军 . 基于扩展 Kalman 滤波的工业控制系统 DDoS攻击检测[J]. 电子技术应用, 2016,42(4): 73-77.
|
|
LI J , GUO X , SUN J . The detection of DDoS attack for industrial control systems based on extended Kalman filtering[J]. Application of Electronic Technique, 2016,42(4): 73-77.
|
[5] |
杨伟, 何杰, 万亚东 ,等. 基于IEEE802.15.4e标准的工业物联网安全时间同步策略[J]. 计算机研究与发展, 2017,54(9): 2032-2043.
|
|
YANG W , HE J , WAN Y D ,et al. Security countermeasures for time synchronization in IEEE802.15.4e-based industrial IoT[J]. Journal of Computer Research and Development, 2017,54(9): 2032-2043.
|
[6] |
李绍晖, 刘纪伟 . 一种面向工业控制系统的改进CUSUM入侵检测方法[J]. 电子技术应用, 2015,41(9): 118-121.
|
|
LI S H , LIU J W . An improved CUSUM algorithm in intrusion detection for industry control systems[J]. Application of Electronic Technique, 2015,41(9): 118-121.
|
[7] |
王华忠, 杨智慧, 颜秉勇 ,等. 融合PCA和PSO-SVM方法在工控入侵检测中的应用[J]. 科技通报, 2017,33(1): 80-85.
|
|
WANG H Z , YANG Z H , YAN B Y ,et al. Application of fusion PCA and PSO-SVM method in industrial control intrusion detection[J]. Bulletin of Science and Technology, 2017,33(1): 80-85.
|
[8] |
贾志伟, 关忠仁, 赵建芳 . 一种基于半监督学习的入侵检测算法[J]. 成都信息工程学院学报, 2012,27(6): 560-563.
|
|
JIA Z W , GUAN Z R , ZHAO J F . Intrusion detection algorithm based on semi-supervised learning[J]. Journal of Chengdu University of Information Technology, 2012,27(6): 560-563.
|
[9] |
李金武 . 基于云模型主机安全评估方法[J]. 洛阳师范学院学报, 2017,36(2): 59-63.
|
|
LI J W . An assessment method of host security based on cloud model[J]. Journal of Luoyang Normal University, 2017,36(2): 59-63.
|
[10] |
王辉, 秦术, 刘少英 ,等. 曲线拟合的逆向云改进算法[J]. 智能系统学报, 2014,9(5): 590-594.
|
|
WANG H , QIN S , LIU S Y ,et al. An improved algorithm of backward cloud based on curve fitting[J]. CAAI Transactions on Intelligent Systems, 2014,9(5): 590-594.
|
[11] |
刘常昱, 冯芒, 戴晓军 ,等. 基于云 X 信息的逆向云新算法[J]. 系统仿真学报, 2004,16(11): 2417-2420.
|
|
LIU C Y , FENG M , DAI X J ,et al. A new algorithm of backward cloud[J]. Journal of System Simulation, 2004,16(11): 2417-2420.
|
[12] |
DOWNS J J , VOGEL E F . A plant-wide industrial process control problem[J]. Computers and Chemical Engineering, 1993,17: 245-255.
|