[1] MIAO Xin,CHEN Xi,MA Xiaoming,et al.Comparing smart grid technology standards roadmap of the IEC,NIST and SGCC[C]//Proceedings of 2012 China International Conference on Electricity Distribution.Washington D.C.,USA:IEEE Press,2012:1-4. [2] BERTHIER R,SANDERS W H.Specification-based intrusion detection for advanced metering infrastructures[C]//Proceedings of the 17th Pacific Rim International Symposium on Dependable Computing.Washington D.C.,USA:IEEE Press,2011:184-193. [3] FAISAL M A,AUNG Z,WILLIAMS J R,et al.Securing advanced metering infrastructure using intrusion detection system with data stream mining[C]//Proceedings of Pacific-Asia Workshop on Intelligence and Security Informatics.Berlin,Germany:Springer,2012:96-111. [4] ZHANG Yichi,WANG Lingfeng,SUN Weiqing,et al.Distributed intrusion detection system in a multi-layer network architecture of smart grids[J].IEEE Transactions on Smart Grid,2011,2(4):796-808. [5] WANG K,DU M,MAHARJAN S,et al.Strategic honeypot game model for distributed denial of service attacks in the smart grid[J].IEEE Transactions on Smart Grid,2017,8(5):2474-2482. [6] LIU Xiaoxue,ZHU Peidong,ZHANG Yan,et al.A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure[J].IEEE Transactions on Smart Grid,2015,6(5):2435-2443. [7] LIANG Jianquan.Research on security defense technology of WSNs in advanced metering infrastructure[D].Harbin:Harbin Institute of Technology,2016.(in Chinese) 梁建权.高级量测体系WSNs安全防御技术研究[D].哈尔滨:哈尔滨工业大学,2016. [8] LI Chunyang,WANG Xianpei,TIAN Meng,et al.Abnormal power consumption detection in AMI environment[J].Computer Simulation,2018,35(8):66-70.(in Chinese) 李春阳,王先培,田猛,等.AMI环境下异常用电检测研究[J].计算机仿真,2018,35(8):66-70. [9] LI Yuancheng,QIU Rixuan,JING Sitong.Intrusion detection system using Online Sequence Extreme Learning Machine(OS-ELM) in advanced metering infrastructure of smart grid[J].PloS One,2018,13(2):1-16. [10] HINTON G E,OSINDERO S,TEH Y W.A fast learning algorithm for deep belief nets[J].Neural Computation,2006,18(7):1527-1554. [11] HINTON G E.A practical guide to training restricted Boltzmann machines[M].Berlin,Germany:Springer,2012. [12] GAO Ni,GAO Ling,HE Yiyue.Deep Belief Nets model oriented to intrusion detection system[J].Systems Engineering and Electronics,2016,38(9):2201-2207.(in Chinese) 高妮,高岭,贺毅岳.面向入侵检测系统的Deep Belief Nets模型[J].系统工程与电子技术,2016,38(9):2201-2207. [13] GAO Qiang,MA Yanmei.Research and application of the level of the Deep Belief Network(DBN)[J].Science Technology and Engineering,2016,16(23):234-238,262.(in Chinese) 高强,马艳梅.深度信念网络(DBN)网络层次数量的研究及应用[J].科学技术与工程,2016,16(23):234-238,262. [14] JIA Qiong.Research on ensemble fault diagnosis method for motor device[D].Shenyang:Shenyang University of Science and Technology,2017.(in Chinese) 贾琼.面向电机装置的集合型故障诊断方法研究[D].沈阳:沈阳理工大学,2017. [15] ZHANG Chaochao.Research on AMI intrusion detection method in smart grid[D].Beijing:North China Electric Power University,2016.(in Chinese) 张超超.智能电网高级量测体系入侵检测方法研究[D].北京:华北电力大学,2016. [16] HUANG G B,ZHU Q Y,SIEW C K.Extreme learning machine:a new learning scheme of feedforward neural networks[J].Neural Networks,2004,2:985-990. [17] XU Rui,LIANG Xun,QI Jinshan,et al.Advances and trends in extreme learning machine[J].Chinese Journal of Computers,2019,42(7):1640-1670.(in Chinese)徐睿,梁循,齐金山,等.极限学习机前沿进展与趋势[J].计算机学报,2019,42(7):1640-1670. [18] DENG W Y,ONG Y S,TAN P S,et al.Online sequential reduced kernel extreme learning machine[J].Neurocomputing,2016,174:72-84. [19] TAVALLAEE M,BAGHERI E,LU W,et al.A detailed analysis of the KDD CUP 99 data set[C]//Proceedings of 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.Washington D.C.,USA:IEEE Press,2009:1-6. [20] DING Longbin,WU Zhongdong,SU Jiali.Intrusion detection method based on ensemble deep forests[J].Computer Engineering,2020,46(3):144-150.(in Chinese)丁龙斌,伍忠东,苏佳丽.基于集成深度森林的入侵检测方法[J].计算机工程,2020,46(3):144-150. |