[1] 尚文利,李琳,万明,等.基于优化单类支持向量机的工业控制系统入侵检测算法[J].信息与控制,2015,44(6):678-684. (SHANG W L, LI L, WAN M, et al. Intrusion detection algorithm based on optimized one-class support vector machine for industrial control system[J]. Information and Control, 2015, 44(6):678-684.) [2] 尚文利,张盛山,万明,等.基于PSO-SVM的Modbus TCP通讯的异常检测方法[J].电子学报,2014,42(11):2314-2320. (SHANG W L, ZHANG S S, WAN M, et al. Modbus TCP communication anomaly detection algorithm based on PSO-SVM[J]. Acta Electronic Sinica, 2014, 42(11):2314-2320.) [3] 张云贵,赵华,王丽娜.基于工业控制模型的非参数CUSUM入侵检测方法[J].东南大学学报(自然科学版),2012,42(S1):55-59. (ZHANG Y G, ZHAO H, WANG L N. A non-parametric CUSUM intrusion detection method based on industrial control model[J]. Journal of Southeast University (Natural Science Edition), 2012, 42(S1):55-59.) [4] MUTHA M A A, TUTEJA M R R. Secure and efficient approach for multilayer cyber security based on intrusion detection system[J]. International Journal of Advent Research in Computer and Electronics, 2015, 2(2):33-37. [5] KWON Y J, KIM H K, LIM Y H, et al. A behavior-based intrusion detection technique for smart grid infrastructure[C]//Proceedings of the 2015 IEEE Eindhoven PowerTech. Piscataway, NJ:IEEE, 2015:1-6. [6] 周世波,徐维祥.船舶轨迹异常检测方法研究进展[J].电子测量与仪器学报,2017,30(3):329-337. (ZHOU S B, XU W X. Research progress on anomaly detection in vessel tracking[J]. Journal of Electronic Measurement and Instrument, 2017, 30(3):329-337.) [7] 刘珊珊,谢晓尧,景凤宣,等.基于PCA的PSO-BP入侵检测研究[J].计算机应用研究,2016,33(9):2795-2798. (LIU S S, XIE X Y, JING F X, et al. Research on network intrusion detection based on PCA PSO-BP[J]. Application Research of Computers, 2016, 33(9):2795-2798.) [8] 潘昊,侯清兰.基于粒子群优化算法的BP网络学习研究[J].计算机工程与应用,2006,42(16):41-43. (PAN H, HOU Q L. A BP neural networks learning algorithm research based on particle swarm optimizer[J]. Computer Engineering and Application, 2006, 42(16):41-43.) [9] 马吉明,徐忠仁,王秉政.基于粒子群优化的灰色神经网络组合预测模型研究[J].计算机工程与科学,2012,34(2):146-149. (MA J M, XU Z R, WANG B Z. A PSO-based combined forecasting grey neural network model[J].Computer Engineering & Science, 2012, 34(2):146-149.) [10] 吕振肃,侯志荣.自适应变异的粒子群优化算法[J].电子学报,2004,32(3):416-420. (LYU Z S, HOU Z R. Particle swarm optimization algorithm based on adaptive mutation[J]. Acta Electronic Sinica, 2004, 32(3):416-420.) [11] BABAZADEH A, POORZAHEDY H, NIKOOSOKHAN S. Application of particle swarm optimization to transportation network design problem[J]. Journal of King Saud University-Science, 2011, 23(3):293-300. [12] MAGNANTI T L, WONG R T. Network design and transportation planning:models and algorithms[J]. Transportation Science, 1984, 18(1):1-55. [13] 郭通,兰巨龙,李玉峰,等.基于量子自适应粒子群优化径向基函数神经网络的网络流量预测[J].电子与信息学报,2013,35(9):2220-2226. (GUO T, LAN J L, LI Y F, et al. Prediction of network traffic based on quantum adaptive particle swarm optimization and radial basis function neural network[J]. Journal of Electronics Information Technology, 2013, 35(9):2220-2226.) [14] CHEN W N, ZHANG J, CHUNG H S H, et al. A novel set-based particle swarm optimization method for discrete optimization problems[J]. IEEE Transactions on Evolutionary Computation, 2010, 14(2):278-300. [15] 艾永冠,朱卫东,闫冬.基于PSO-BP神经网络的股市预测模型[J].计算机应用,2008,28(S2):105-108. (AI Y G, ZHU W D, YAN D. Stock marker forecast model based on PSO-BP neural network[J]. Journal of Computer Applications, 2008, 28(S2):105-108.) [16] YANG Y, MCLAUGHLIN K, LITTLER T, et al. Rule-based intrusion detection system for SCADA networks[C]//RPG 2013:Proceedings of the 2nd IET on Renewable Power Generation Conference. Stevenage, UK:IET, 2013:1-4. [17] MCPARLAND C, PEISERT S, SCAGLIONE A. Monitoring security of networked control systems:it's the physics[J]. IEEE Security & Privacy, 2014, 12(6):32-39. [18] BAIG Z A. Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching[J]. International Journal of Security & Networks, 2012, 7(2):83-94. [19] 尚文利,安攀峰,万明,等.工业控制系统入侵检测技术的研究及发展综述[J].计算机应用研究,2017,34(2):328-333. (SHANG W L, AN P F, WAN M, et al. Research and development overview of intrusion detection technology in industrial control system[J]. Application Research of Computers, 2017, 34(2):328-333.) [20] 王海凤.工业控制网络的异常检测与防御资源分配研究[D].杭州:浙江大学,2014:36-57. (WANG H F. On anomaly detection and defense resource allocation of industrial control networks[D]. Hangzhou:Zhejiang University, 2014:36-57.) [21] 肖国荣.改进蚁群算法和支持向量机的网络入侵检测[J].计算机工程与应用,2014,50(3):75-78. (XIAO G R. Network intrusion detection by combination of improved ACO and SVM[J]. Computer Engineering and Applications, 2014, 50(3):75-78.) [22] 周亚建,徐晨,李继国.基于改进CURE聚类算法的无监督异常检测方法[J].通信学报,2010,31(7):18-23. (ZHOU Y J, XU C, LI J G. Unsupervised anomaly detection method based on improved CURE clustering algorithm[J]. Journal on Communications, 2010, 31(7):18-23.) |