[1] |
SERPANOS D.Secure and resilient industrial control systems[J].IEEE Design and Test,2018,35(1):90-94.
|
[2] |
JEAN-PIERRE A,SNOWDON J L,STAVROU A,et al.Cybersecurity leadership:competencies,governance and technologies for industrial control systems[J].Journal of Interconnection Networks,2017,17(1):1-5.
|
[3] |
LAI Yingxu,LIU Zenghui,CAI Xiaotian,et al.Research on intrusion detection of industrial control system[J].Journal on Communications,2017,38(2):143-156.(in Chinese)赖英旭,刘增辉,蔡晓田,等.工业控制系统入侵检测研究综述[J].通信学报,2017,38(2):143-156.
|
[4] |
TENG Shaohua,WU Naiqi.SVM-DT-based adaptive and collaborative intrusion detection[J].IEEE/CAA Journal of Automatica Sinica,2018,5(1):108-118.
|
[5] |
ONDERJ L,TODD V,MILOS M.Neural network based intrusion detection system for critical infrastructures[C]//Proceedings of International Joint Conference on Network.Washington D.C.,USA:IEEE Press,2009:14-19.
|
[6] |
GAO W,MORRIS T,REVAVES B,et al.On SCADA control systems command and response injection and intrusion detection[C]//Proceedings of 2010 eCrime Researchers Summit.Washington D.C.,USA:IEEE Press,2010:1-9.
|
[7] |
SHANG Wenli,ZHANG Shengshan,WAN Ming,et al.Modbus/TCP communication anomaly detection algorithm based on PSO-SVM[J].Acta Electronica Sinica,2014,42(11):2314-2320.(in Chinese)尚文利,张盛山,万明,等.基于PSO-SVM的Modbus TCP通讯的异常检测方法[J].电子学报,2014,42(11):2314-2320.
|
[8] |
CHEN Dongqing,ZHANG Puhan,WANG Huazhong.Intrusion detection for industrial control systems based on an improved SVM method[J].Journal of Tsinghua University(Science and Technology),2018,58(4):380-386.(in Chinese)陈冬青,张普含,王华忠.基于MIKPSO-SVM方法的工业控制系统入侵检测[J].清华大学学报(自然科学版),2018,58(4):380-386.
|
[9] |
MAGLARAS L A,JIANG J M,CRUZ T J.Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems[J].Journal of Information Security and Applications,2016(30):15-26.
|
[10] |
YOUN E,KOENIG L.Support vector-based selection using Fisher's linear discriminant and support vector machine[J].Expert Systems with Application,2010,37(9):6148-6156.
|
[11] |
ZHANG Xueqin,GU Chunhua.A method to extract network intrusion detection feature[J].Journal of South China University of Technology(Natural Science Edition),2010,38(1):81-86.(in Chinese)张雪芹,顾春华.一种网络入侵检测特征提取方法[J].华南理工大学学报(自然科学版),2010,38(1):81-86.
|
[12] |
DING Yan,LI Yongzhong.Research on intrusion detection algorithm based on PCA and semi-supervised clustering[J].Journal of Shandong University(Engineering Science),2012,42(5):41-46.(in Chinese)丁彦,李永忠.基于PCA与半监督聚类的入侵检测算法研究[J].山东大学学报(工学版),2012,42(5):41-46.
|
[13] |
DONG Xue,ZHANG Deping.Submarine threat degree assessment model based on hybrid kernel principal component analysis[J].Computer Engineering,2018,44(11):40-45.(in Chinese)董雪,张德平.基于组合核主成分分析的潜艇威胁度评估模型[J].计算机工程,2018,44(11):40-45.
|
[14] |
CHEN Sugen,WU Xiaojun,YIN Hefeng.KPCA method based on within-class auxiliary training samples and its application to pattern classification[J].Pattern Analysis and Applications,2017,20(3):749-767.
|
[15] |
LIU Ming,WU Zhaoxia.Theory and application of support vector machine[J].Science & Technology Vision,2018(23):68-69.(in Chinese)刘铭,吴朝霞.支持向量机理论与应用[J].科技视界,2018(23):68-69.
|
[16] |
LI Ting,HONG Zhennan,LIU Zhiyong,et al.Intrusion detection based on incremental one-class support vector machine for industrial control system[J].Information and Control,2018,47(6):756-761.(in Chinese)李挺,洪镇南,刘智勇,等.基于增量单类支持向量机的工业控制系统入侵检测[J].信息与控制,2018,47(6):756-761.
|
[17] |
WANG Yunpeng,ZHANG Hao.Review of network intrusion detection algorithms based on support vector machines[J].Scientific and Technological Innovation Information,2017(25):136-137.(in Chinese)王云鹏,张浩.基于支持向量机的网络入侵检测算法综述[J].科学技术创新,2017(25):136-137.
|
[18] |
KENNEDY J,EBERHART R C.Particle swarm optimiza-tion[C]//Proceedings of IEEE International Conference on Neural Networks.Washington D.C,USA:IEEE Press,1995:1942-1948.
|
[19] |
SHI Y H,EBERHART R C.Fuzzy adaptive swarm optimization[C]//Proceedings of 2001 Congress on Evolutionary Computation.Washington D.C.,USA:IEEE Press,2001:101-106.
|
[20] |
MORRIS T,GAO W.Industrial control system traffic data sets for intrusion detection research[J].Critical Infrastructure Protection VIII,2014,441:65-78.
|