[1] |
PIVOTO D G , ALMEIDA L F , RIGHI R ,et al. Cyber-physical systems architectures for industrial Internet of things applications in industry 4.0:a literature review[J]. Journal of Manufacturing Systems, 2021,58: 176-192.
|
[2] |
SALAU B A , RAWAL A , RAWAT D B . Recent advances in artificial intelligence for wireless Internet of things and cyber–physical systems:a comprehensive survey[J]. IEEE Internet of Things Journal, 2022,9(15): 12916-12930.
|
[3] |
吕思才, 张格, 张耀方 ,等. 一种面向工控系统的PU学习入侵检测方法[J]. 信息安全学报, 2021,6(4): 72-89.
|
|
LV S C , ZHANG G , ZHANG Y F ,et al. A PU learning intrusion detection method for industrial control system[J]. Journal of Cyber Security, 2021,6(4): 72-89.
|
[4] |
NESPOLI P , DíAZ-LóPEZ D , MáRMOL F G . Cyberprotection in IoT environments:a dynamic rule-based solution to defend smart devices[J]. Journal of Information Security and Applications, 2021,60:102878.
|
[5] |
RAJASOUNDARAN S , PRABU A V , SUBRAHMANYAM J B V ,et al. WITHDRAWN:secure watchdog selection using intelligent key management in wireless sensor networks[J]. Materials Today:Proceedings, 2021:doi.org/10.1016/j.matpr.2020.12.1027.
|
[6] |
NAQASH T , TANVEER M H , SHAH S H ,et al. Statistical analysis-based intrusion detection for software defined network[C]// Smart Trends in Computing and Communications. Singapore:Springer, 2022: 279-289.
|
[7] |
IERACITANO C , ADEEL A , MORABITO F C ,et al. A novel statistical analysis and autoencoder driven intelligent intrusion detection approach[J]. Neurocomputing, 2020,387: 51-62.
|
[8] |
ALDRIBI A , TRAORé I , MOA B ,et al. Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking[J]. Computers & Security, 2020,88:101646.
|
[9] |
YAO R Z , WANG N , LIU Z H ,et al. Intrusion detection system in the advanced metering infrastructure:a cross-layer feature-fusion CNN-LSTM-based approach[J]. Sensors, 2021,21(2): 626.
|
[10] |
CHADZA T , KYRIAKOPOULOS K G , LAMBOTHARAN S . Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks[J]. Future Generation Computer Systems, 2020,108: 636-649.
|
[11] |
LI W , MENG W . Collaborative intrusion detection in the era of IoT:recent advances and challenges[J]. Security and Privacy in the Internet of Things:Architectures,Techniques,and Applications, 2021: 123-149.
|
[12] |
SHU J G , ZHOU L , ZHANG W Z ,et al. Collaborative intrusion detection for VANETs:a deep learning-based distributed SDN approach[J]. IEEE Transactions on Intelligent Transportation Systems, 2021,22(7): 4519-4530.
|
[13] |
RUZAFA-ALCáZAR P , FERNáNDEZ-SAURA P , MáRMOL-CAMPOS E ,et al. Intrusion detection based on privacy-preserving federated learning for the industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2021,19(2): 1145-1154.
|
[14] |
YU P Q , WYNTER L , LIM S H . Fed+:a family of fusion algorithms for federated learning[J]. arXiv Preprint,arXiv:2009.06303, 2020.
|
[15] |
ZHANG Z , ZHANG Y , GUO D ,et al. SecFedNIDS:robust defense for poisoning attack against federated learning-based network intrusion detection system[J]. Future Generation Computer Systems, 2022,134: 154-169.
|
[16] |
ABDEL-BASSET M , MOUSTAFA N , HAWASH H ,et al. Federated intrusion detection in blockchain-based smart transportation systems[J]. IEEE Transactions on Intelligent Transportation Systems, 2022,23(3): 2523-2537.
|
[17] |
SHENDE O , PATERIYA R K , VERMA P ,et al. CEBM:collaborative ensemble blockchain model for intrusion detection in IoT environment[J]. Europe PMC, 2021:doi.org/10.21203/rs.3.rs-702181/v1.
|
[18] |
AGRAWAL S , SARKAR S , AOUEDI O ,et al. Federated Learning for intrusion detection system:concepts,challenges and future directions[J]. Computer Communications, 2022,195: 346-361.
|
[19] |
MORRIS T , GAO W . Industrial control system traffic data sets for intrusion detection research[C]// International Conference on Critical Infrastructure Protection. Berlin:Springer, 2014: 65-78.
|
[20] |
CHATZOGLOU E , KAMBOURAKIS G , KOLIAS C . Empirical evaluation of attacks against IEEE 802.11 enterprise networks:the AWID3 dataset[J]. IEEE Access, 2021,9: 34188-34205.
|
[21] |
XU C G , REN J , ZHANG D Y ,et al. GANobfuscator:mitigating information leakage under GAN via differential privacy[J]. IEEE Transactions on Information Forensics and Security, 2019,14(9): 2358-2371.
|
[22] |
ZHAO R J , WANG Y J , XUE Z ,et al. Semisupervised federated-learning-based intrusion detection method for Internet of things[J]. IEEE Internet of Things Journal, 2023,10(10): 8645-8657.
|
[23] |
IDRISSI M J , ALAMI H , MAHDAOUY A E ,et al. Fed-ANIDS:federated learning for anomaly-based network intrusion detection systems[J]. Expert Systems With Applications, 2023,234:121000.
|
[24] |
PHAN N , WU X T , HU H ,et al. Adaptive laplace mechanism:differential privacy preservation in deep learning[C]// Proceedings of 2017 IEEE International Conference on Data Mining (ICDM). Piscataway:IEEE Press, 2017: 385-394.
|