总第227期
参考文献:
李熠李永忠基于自编码器和极限学习机的工业控制网络入侵检测算法413
40-47.
Sun
detection
Kang,Li Qianmu,Li Deqiang.Face
based on cascaded convolutional neural net—
algorithm
陶耀东,李宁,曾广圣.工业控制系统安全综述[J].
of
of Science and
work[J].Journal
Nanjing University
计算机工程与应用,2016,52(13):8-18.
Tao
of
Technology.2018,42(1):40—47.
Yaodong,Li Ning,Zeng Guangsheng.Review
徐萍,吴超,胡峰俊,等.基于迁移学习的个性化循
环神经网络语言模型[J].南京理工大学学报,
2018,42(4):401—408.
industrial control
[10]
systems security[J].Computer
and
Engineering
Applications,2016,52(13):8—18.
尚文利,安攀峰,万明,等.工业控制系统入侵检测
技术的研究及发展综述[J].计算机应用研究,
2017,34(2):328—333,342.
[2]
Xu
a1.Personalized
model based on
of
Chao,Hu Fen舀un,et
Ping,Wu
reeurrent neural network
language
transfer
of
a1.Research
learning[J].Journal
Nanjing University
Wenli,An
Shang
and
Panfeng,Wan Ming,et
overview of
Science and
detection
Technology,2018,42(1):40—47.
the dimension—
intrusion
development
Hinton
G
E,Salakhutdinov
in industrial control
R.Reducing
technology
system[J].Application
of data with neural
Research of
ality
networks[J].Science,
Computers,2017,34(2):328—333,342.
2006(313):504—507.
[3]
尚文利,张盛山,万明,等.基于PSO.SVM的Modbus
袁非牛,章琳,史劲亭,等.自编码神经网络理论及
应用综述[J].计算机学报,2019,42(1):203—230.
[12]
TCP通讯的异常检测方法[J].电子学报,2014,
42(11):2314—2320.
Yuan
and
a1.Theories
networks:a
Journal of
Computers,
Feiniu,Zhang Lin,Shi Jinting,et
a1.
Wenli,Zhang
Shang
Shengshan,Wan Ming,et
of auto—eneoder neural
applications
Modbus/TCP
communication
detection
anomaly
literature
based on PSO—SVM『J1.Acta Electronica
survey[J].Chinese
algorithm
2019,42(1):203—230.
Sinica,2014,42(1 1):2314—2320.
[13] 王声柱,李永忠.基于深度学习和半监督学习的入
侵检测算法[J].信息技术,2017(1):101—104,108.
[4]
[5]
[6]
陈庄,黄勇,邹航.基于离群点挖掘的工业控制系统
异常检测[J].计算机科学,2014,41(5):178—
181,203.
detection
Wang Shengzhu,Li Yongzhong.Intrusion
and
learning
based on
Chen
detec-
algorithm
deep
semi—supervised
Zhuang,Huang Yong,Zou Hang.Anomaly
tion of industrial control
based on outlier
learning[J].Information Technology,2017(1):101—
104,108.
system
mining
[J].Computer Science,2014,41(5):178—181,203.
G
C K.Extreme
B,Zhu
Y,Siew
Beaver
R
M
C,Buckner
A.An
[14] Huang
Q
learning
Neu—
J
M,Borges—Hink
and
evaluation of machine
methods to detect mali—
of
machine:Theory
applications[J].
learning
cious SCADA
rocomputing,2006,70(1—3):489—501.
Morris W.Industrial control traffic data
system
communications[C]//Proceedings
on
the 2013 12th
[15]
T,Gao
International Conference
Machine
sets for intrusion detection
and
02.New
research[C]//International
Infrastructure
Learning
Applications—Volume
York,
Conference on
Critical
Protection.
USA:IEEE.2013.
Berlin,Germany:Springer,2014.
张云贵,赵华,王丽娜.基于工业控制模型的非参数
CUSUM入侵检测方法[J].东南大学学报(自然科
学版),2012,42(S1):55—59.
[16] 谢中华.Matlab统计分析与应用:40个案例分析
[M].北京:北京航空航天大学出版社,2010.
[17] 安琪.基于深度置信网络的入侵检测研究[D].兰
州:兰州大学,2016.
Lina.A non·
Zhang Yungui,Zhao Hua,Wang
CUSUM intrusion detection method based
parametric
于海宁.基于MLP和Elman混合神经网络的入侵
检测系统[D].哈尔滨:哈尔滨工业大学,2008.
王华忠,杨智慧,颜秉勇,等.融合PCA和PSO—SVM
方法在工控入侵检测中的应用[J].科技通报,
2017,33(1):80一85.
on industrial control
of Southeast
[18]
model[J].Journal
University,2012,42(S1):55—59.
[19]
[7] 高春梅.基于工业控制网络的流量异常检测[D].
北京:北京工业大学.2014.
Hinton
G
Y W.A fast
[8]
E,Osindero S,Teh
learning
Neural
a1.
Zhihui,Yan
Bingyong,et
for
belief
Wang Huazhong,Yang
algorithm
deep
nets[J].
of fusion PCA and PSO-SVM
in
method
Application
Computation,2006,18(7):1527—1554.
industrial control intrusion
of
detection[J].Bulletin
[9]
孙康,李千目,李德强.基于级联卷积神经网络的人
脸检测算法[J].南京理工大学学报,2018,42(1):
Science and
Technology,2017,33(1):80—85.
万方数据
全部评论(0)