[1] |
FALLIERE N , MURCHU L O , CHIEN E . W32 stuxnet dossier[R]. White Paper,Symantec Corp,Security Response, 2011.
|
[2] |
DONALD P C . The application of autonomic computing for the protection of industrial control systems[M]. Tucson: The University of Arizona, 2011.
|
[3] |
BENCSATH B , PEK G , BUTTYAN L ,et al. Duqu:analysis,detection,and lessons learned[C]// ACM European Workshop on System Security (EuroSec). Bern,Switzerland,ACM, 2012: 1-6.
|
[4] |
STOUFFER K , FALCO J , SCARFONE K . SP 800-82,guide to industrial control systems (ICS) security[P]. National Institute of Standards& Technology, 2011.
|
[5] |
李琳, 尚文利, 姚俊 ,等. 单类支持向量机在工业控制系统入侵检测中的应用研究综述[J]. 计算机应用研究, 2016,33(1): 7-11.
|
|
LI L , SHANG W L , YAO J ,et al. Overview of one-class support vector machine in intrusion detection of industrial control system[J]. Application Research of Computers, 2016,33(1): 7-11.
|
[6] |
CARDENAS A A , AMIN S , LIN Z S ,et al. Attacks against process control systems:risk assessment,detection,and response[C]// The 6th ACM Symposium on Information,Computer and Communications Security. ACM, 2011: 355-366.
|
[7] |
WEI M , KIM K . Intrusion detection scheme using traffic prediction for wireless industrial networks[J]. Journal of Communications and Networks, 2012,14(3): 310-318.
|
[8] |
BARBOSA R R R , SADRE R , PRAS A . Towards periodicity based anomaly detection in SCADA networks[C]// 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012). 2012: 1-4.
|
[9] |
RRUSHI J , KANG K D . Detecting anomalies in process control networks[M]. Critical Infrastructure Protection III. Springer Berlin Heidelberg, 2009: 151-165.
|
[10] |
MORRIS T H , JONES B A , VAUGHN R B ,et al. Deterministic intrusion detection rules for Modbus protocols[C]// The 46th Hawaii International Conference on System Sciences (HICSS). 2013: 1773-1781.
|
[11] |
MORRIST , VAUGHN R , DANDASS Y . A retrofit network intrusion detection system for modbus RTU and ASCII industrial control systems[C]// The 45th Hawaii International Conference on System Science. 2012: 2338-2345.
|
[12] |
CARCANO A , COLETTA A , GUGLIELMI M ,et al. A multidimensional critical state analysis for detecting intrusions in SCADA systems[J]. IEEE Transactions on Industrial Informatics, 2011,7(2): 179-186.
|
[13] |
FOVINO I N , CARCANO A , MUREL T D L ,et al. Modbus/DNP3 state-based intrusion detection system[C]// 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA). 2010: 729-736.
|
[14] |
GOLDENBERG N , WOOL A . Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems[J]. International Journal of Critical Infrastructure Protection, 2013,6(2): 63-75.
|
[15] |
DAMIANI E . Composite intrusion detection in process control networks[D]. Uniersity Degli Studi Di Milano, 2009.
|
[16] |
LINDA O , MANIC M , VOLLMER T ,et al. Fuzzy logic based anomaly detection for embedded network security cyber sensor[C]// IEEE Symposium on Computational Intelligence in Cyber Security. 2011: 202-209.
|
[17] |
LINDA O , VOLLMER T , MANIC M . Neural network based intrusion detection system for critical infrastructures[C]// International Joint Conference on Neural Networks. 2009: 1827-1834.
|
[18] |
ANOOP A , SREEIA M S . New genetic algorithm based intrusion detection system for SCADA[J]. International Journal of Engineering Innovations and Research, 2013,2(2): 171-175.
|
[19] |
济晓 . MATLAB 在振动信号处理中的应用[M]. 北京: 中国水利水电出版社, 2006.
|
|
JI X . The application of MATLAB in vibration signal processing[M]. Beijing: China Water Conservancy and Hydropower Press, 2006.
|
[20] |
言俊科 . 系统辨识理论及应用[M]. 北京: 国防工业出版社, 2003.
|
|
YAN J K . System identification theory and application[M]. Beijing: National Defence Industry Press, 2003.
|