[1]WALSH G C, YE H, BUSHNELL L G. Stability analysis of networked control systems [J]. IEEE Transactions on Control Systems Technology, 2002, 10(3): 438-446.
[2]ZHANG X M, HAN Q L, YU X H. Survey on recent advances in networked control systems[J]. IEEE Transactions on Industrial Informatics, 2016, 12(5): 1740-1752.
[3]DRIAS Z, SERHROUCHNI A, VOGEL O. Analysis of cyber security for industrial control systems[C]∥International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications. Shanghai, China: IEEE, 2015: 1-8.
[4]刘烃, 田决, 王稼舟, 等. 信息物理融合系统综合安全威胁与防御研究[J]. 自动化学报, 2019, 45(1): 5-24.
LIU Ting, TIAN Jue, WANG Jiazhou, et al. Integrated security threats and defense of cyber-physical systems[J]. Acta Automatica Sinica, 2019, 45(1): 5-24.
[5]URBINA D I, GIRALDO J A, TIPPENHAUER N O, et al. Attacking fieldbus communications in ICS: Applications to the SWaT testbed[C]∥Singapore Cyber-Security Conference. Singapore: Singapore University of Technology and Design, 2016: 75-89.
[6]QUARTA D, POGLIANI M, POLINO M, et al. An experimental security analysis of an industrial robot controller[C]∥IEEE Symposium on Security and Privacy. San Jose, CA, USA: IEEE, 2017: 268-286.
[7]MANANDHAR K, CAO X J, HU F, et al. Detection of faults and attacks including false data injection attack in smart grid using kalman filter[J]. IEEE Transactions on Control of Network Systems, 2014, 1(4): 370-379.
[8]URBINA D I, GIRALDO J A, CARDENAS A A, et al. Limiting the impact of stealthy attacks on industrial control systems[C]∥23rd ACM Conference on Computer and Communications Security. Vienna, Austria: ACM, 2016: 1092-1105.
[9]俞立. 现代控制理论[M]. 北京: 清华大学出版社, 2007.
YU Li. Modern control theory[M]. Beijing: Tsinghua University Press, 2007.
[10]CARDENAS A A, AMIN S, SASTRY S. Secure control: Towards survivable cyber-physical systems[C]∥28th International Conference on Distributed Computing Systems Workshops. Beijing, China: IEEE, 2008: 495-500.
[11]MOON D, LEE J D, JEONG Y S, et al. RTNSS: A routing trace-based network security system for preventing ARP spoofing attacks[J]. The Journal of Supercomputing, 2016, 72(5): 1740-1756.
[12]LIU Y, NING P, REITER M K. False data injection attacks against state estimation in electric power grids [J]. ACM Transactions on Information and System Security, 2011, 14(1): 1-33.
[13]陆耿虹, 冯冬芹. 基于改进C-SVC的工控网络安全态势感知[J]. 控制与决策, 2017, 32(7): 1223-1228.
LU Genghong, FENG Dongqin. Industrial control network security situation awareness based on improved C-SVC[J]. Control and Decision, 2017, 32(7): 1223-1228.
[14]REGALADO D, HARRIS S. 灰帽黑客: 正义黑客的道德规范、渗透测试、攻击方法和漏洞分析[M]. 第4版. 北京: 清华大学出版社, 2016.
REGALADO Daniel, HARRIS Shon. Gray hat hacking: The ethical hacker’s handbook[M]. 4th ed. Beijing: Tsinghua University Press, 2016.
[15]李航. 统计学习方法[M]. 北京: 清华大学出版社, 2012.
LI Hang. Statistical learning method[M]. Beijing: Tsinghua University Press, 2012.
[16]CHANG C C, LIN C J. LIBSVM-A library for support vector machines [CP/OL]. (2019-9-11)[2019-12-10]. http:∥www.csie.ntu.edu.tw/~cjlin/libsvm/.
[17]周志华. 机器学习[M]. 北京: 清华大学出版社, 2016.
ZHOU Zhihua. Machine learning[M]. Beijing: Tsinghua University Press, 2016. |