共 24 条
- [1] WANG Zhongjie, XIE Lulu, Cyber-physical systems:A survey [J]., Acta Automatica Sinica, 37, 10, pp. 1157-1166, (2011)
- [2] WALSH G C, YE H., Scheduling of networked control systems [J], IEEE Control Systems, 21, 1, pp. 57-65, (2001)
- [3] MAHMOUD M S,, HAMDAN M M,, BARUDI U A., Modeling and control of cyber-physical systems subject to cyber attacks:A survey of recent advances and challenges [J], Neurocomputing, 338, 21, pp. 101-115, (2019)
- [4] LANGNER R., Stuxnet: dissecting a cyberwarfare weapon [J], IEEE Security and Privacy Magazine, 15, 1, pp. 49-51, (2011)
- [5] TANG Yi, CHEN Qian, LI Mengya, Review of network attack research in power information physical fusion system environment [J], Automation of Electric Power Systems, 40, 17, pp. 59-69, (2016)
- [6] Secure estimation and control for cyber-physical systems under adversarial attacks [J], IEEE Transactions on Automatic Control, 59, 6, pp. 1454-1467, (2014)
- [7] KONG L S,, LIU Z, Machine learning and deep learning methods for cyber security [J].IEEE Access, 6, pp. 35365-35381, (2018)
- [8] CHAUDHARI R S,, TALMALE G R., A review on detection approaches for distributed denial of service attacks, Proceedings of the 2019 International Conference on Intelligent Sustainable Systems(ICISS), pp. 323-327, (2019)
- [9] MURUGAN K,, SURESH P., Efficient anomaly intrusion detection using hybrid probabilistic techniques in wireless ad hoc network [J], International Journal of Network Security, 20, 4, pp. 730-737, (2018)
- [10] BUCZAK A L,, GUVEN E., A survey of data mining and machine learning methods for cyber security intrusion detection [J], IEEE Communications Surveys and Tutorials, 18, 2, pp. 1153-1176, (2017)