1 |
Serpanos D.Secure and resilient industrial control systems [J].IEEE Design & Test,2018,35(1):90-94.
|
2 |
Paridari K,Mahony,Mady A E,et al.A framework for at-tack-resilient industrial control systems: attack detection and controller reconfiguration [J].Proceedings of the IEEE,2018,106(1):113-128.
|
3 |
Geng Z Q,Chen N,Han Y,et al.An improved intelligent early warning method based on MWSPCA and its application in complex chemical processes [J].The Canadian Journal of Chemical Engineering,2019,doi.org/0.1002/cjce.23674.
|
4 |
Geng Z Q,Liu F F,Han Y M,et al.Fault diagnosis of chemical processes based on a novel adaptive kernel principal component analysis[C]//12th Asian Control Conference.Fukuoka,2019:1495-1500
|
5 |
Chung M Y,Ahn W,Min B G,et al.An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants [J].Journal of Supercomputing,2018,74(3):1378-1393.
|
6 |
Wu M T,Song Z Y,Moon Y B.Detecting cyber-physical attacks in cyber manufacturing systems with machine learning methods [J].Journal of Intelligent Manufacturing,2019,30(3):1-13.
|
7 |
Yılmaz E N,Gönen S.Attack detection/prevention system against cyber-attack in industrial control systems [J].Computers & Security,2018,77:94-105.
|
8 |
Li J,Zha Y.CMA: a reconfigurable complex matching accelerator for wire-speed network intrusion detection [J].IEEE Computer Architecture Letters,2018,17(1):33-36.
|
9 |
Kasongo S M,Sun Y X.A deep learning method with filter based feature engineering for wireless intrusion detection system [J].IEEE Access,2019,7:38597-38607.
|
10 |
Wang N,Du X H,Wang W J.Building a cloud IDS using an efficient feature selection method and SVM [J].IEEE Access,2019,7:1345-1354.
|
11 |
Acharya N,Singh S.An IWD-based feature selection method for intrusion detection system [J].Soft Computing,2018,22(13):4407-4416.
|
12 |
Zhou T,Lu H L,Wang W W,et al.GA-SVM based feature selection and parameter optimization in hospitalization expense modeling [J].Applied Soft Computing,2019,75:323-332.
|
13 |
Tao P Y,Sun Z,Sun Z X.An improved intrusion detection algorithm based on GA and SVM [J].IEEE Access,2018,6:1.
|
14 |
Kushwaha N,Pant M.Link based BPSO for feature selection in big data text clustering [J].Future Generation Computer Systems,2018,82:190-199.
|
15 |
Kashef S,Nezamabadi-pour H.An advanced ACO algorithm for feature subset selection [J].Neurocomputing,2015,147:271-279.
|
16 |
Zawbaa,Hossam M,Emary E,et al.Feature selection approach based on moth-flame optimization algorithm [C]//2016 IEEE Congress on Evolutionary Computation,2015:4612-4617
|
17 |
Milan T,Nebojsa B.Improved seeker optimization algorithm hybridized with firefly algorithm for constrained optimization problems [J].Neurocomputing,2014,143:197-207.
|
18 |
Mirjalili S,Lewis A.Grey wolf optimizer [J].Advances in Engineering Software,2014,69(3):46-61.
|
19 |
Zhou Z Y,Zhang R X,Wang Y M,et al.Color difference classification based on optimization support vector machine of improved grey wolf algorithm [J].Optik,2018,170:17-29.
|
20 |
Li S Y,Wang S M,Wang P F,et al.An improved grey wolf optimizer algorithm for the inversion of geoelectrical data [J].Acta Geophysica,2018,66(4):607-621.
|
21 |
Wu T B,Gui W H,Yang C H,et al.Improved grey wolf optimization algorithm with logarithm function describing convergence factor and its application [J].Journal of Central South University (Science and Technology),2018,49(4):857-864.
|
22 |
Zhang J Q,Liu K,Tan Y,et al.Random black hole particle swarm optimization and its application [C]//2008 International Conference on Neural Net-Works and Signal Processing,2007,1/2:359-365.
|
23 |
Ji Z W,Hu M,Yin J X.A survey of feature selection algorithm [J].Electronic Design Engineering,2011,9:46-51.
|
24 |
Chen B S,Cheng Y M,Lee C H.A genetic approach to mixed H2/H∞ optimal PID control [J].IEEE Control Systems,1995,15(5):51-60.
|
25 |
Downs J J,Vogel E F.A plant-wide industrial process control problem [J].Computers and Chemical Engineering,1993,17(3):245-255.
|
26 |
Ricker N L.Tennessee Eastman challenge archive [EB/OL]. [2017-05-31]. http: //depts.washington.edu/control/LARRY/TE/download.html.
|
27 |
Ricker N L.Decentralized control of the Tennessee Eastman challenge process [J].Journal of Process Control,1996,6(4):205-221.
|
28 |
Lv X F,Xie Y B.An anomaly detection method for industrial control systemsvia state transition graph [J].Acta Automatica Sinica,2018,44(9):1662-1671.
|
29 |
Peterson L.K-nearest neighbor [J].Scholarpedia,2009,4(2):1883.
|
30 |
Langley P,Thompson K.An analysis of Bayesian classifiers [C]//Proceedings of the 10th National Conference on Artificial Intelligence,San Jose, CA,1992:223-228.
|
31 |
Breiman L,Friedman J,Olshen R.Classification and Regression Trees [M].California:Wadsworth Belement,1984.
|