[1] 陈星, 贾卓生.工业控制网络的信息安全威胁与脆弱性分析与研究[J]. 计算机科学,2012,39(10): 188-190
[2] 北京瑞星网安技术股份有限公司. 瑞星2020年中国网络安全报告[J]. 信息安全研究, 2021, 7(2): 102-109.
[3] 平国楼 叶晓俊. 网络攻击模型研究综述[J]. 信息安全研究, 2020, 6(12): 1058-1067.
[4] 王竹晓,张彭彭,李为,等.基于深度Q网络的电力工控网络异常检测系统[J],计算机与现代化,2019,12:114-118
[5] 阎平凡, 张长水.人工神经网络与模拟进化计算[M]. 北京:清华大学出版社,2000
[6] Vapnik V. The Nature of Statistical Learning Theory[M]. New York: Springer, 2000
[7] Hotelling H. Analysis of a complex of statistical variables into principal components[J]. Journal of Educational Psychology, 1993,24: 417-520
[8] 邱锡鹏. 神经网络与深度学习[M].上海:机械工业出版社,2020
[9] Matheus R, Mendonça, Heder S, et al. Reinforcement learning with optimized reward function for stealth applications[J]. Entertainment Computing, 2018,25:37-47(
[10] Yuan Bei, Xia Hao, Guo Caicai. An evaluation index system for intellectual capital evaluation based on machine learning[J]. Alexandria Engineering Journal, 2021,60(1):1519-1524
[11] Chen Manyu, Philip W, Raghavan Srinivasan, et al. Analysis of alternative climate datasets and evapotranspiration methods for the upper mississippi river basin using SWAT within HAWQS[J/OL]. Science of The Total Environment, 2020[2021-01-02]. https://webvpn.hfut.edu.cn/https/77726476706e69737468656265737421e7e056d234336155700b8ca891472636a6d29e640e/science/article/pii/S0048969720310731
[12] Dinh Van Le, Tim Römer. A Kruskal–Katona type result and applications[J/OL]. Discrete Mathematics, 2020,343(5)[2020-12-25]. https://webvpn.hfut.edu.cn/https/77726476706e69737468656265737421e7e056d234336155700b8ca891472636a6d29e640e/science/article/pii/S0012365X19304832