[1] Morris T H, Jones B A, Vaughn R B, et al. Deterministic intrusion detection rules for MODBUS protocols [J]. IEEE Computer Society, 2013, 18(4): 173-177
[2] 刘灿成. 工业控制系统入侵检测技术研究[D].成都:电子科技大学, 2017
[3] Bhatia S, Kush N, Djamaludin C, et al. Practical modbus flooding attack and detection [J]. Queensland University of Technology, 2014,1: 57-65
[4] Fovino I N, Carcano A, Murel T D L, et al. Modbus/DNP3 state-based intrusion detection system[C]//Proc of the 24th IEEE Int Conf on Advanced Information Networking and Applications. Piscataway,NJ: IEEE, 2010: 729-736
[5] Galloway B, Hancke G P. Introduction to industrial control networks [J]. IEEE Communications Surveys & Tutorials, 2013, 15(2):860-880
[6] He K, Zhang X, Ren S, et al. Spatial pyramid pooling in deep convolutional networks for visual recognition [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2015, 37(9): 1904-1916
[7] 张艳升,李喜旺,李丹,等.基于卷积神经网络的工控网络异常流量检测[J].计算机应用,2018,16(8):1-7
[8] 张涛,宋建涛.基于马尔科夫模型和卷积神经网络的异常数据检测方法[J].物联网技术,2018,8(8):80-82
[9] Krizhevsky A, Sutskever I, Hinton G E. ImageNet classification with deep convolutional neural networks [J]. International Conference on Neural Information Processing Systems Advances in neural information processing systems. 2012, 25(2):1097-1105
[10] Oquab M, Bottou L, Laptev I, et al. Learning and transferring mid-level image representations using convolutional neural networks [C]//Proc of IEEE Conf on Computer Vision and Pattern Recognition (CVPR). Washington, DC:IEEE Computer Society, 2014
|