[1] 魏钦志.工业网络控制系统的安全与管理[J].测控技术,2013,32(2):87-92. Wei Qin-zhi.Industrial network control system security and management[J].Measurement & Control Technology,2013,32(2):87-92.(in Chinese)
[2] 彭勇,江长青,谢丰,等.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1405. Peng Yong,Jiang Changqing,Xie Feng,et al.Industrial control system cyber security research[J].Journal of Tsinghua University(Science and Technology),2012,52(10):1396-1405.(in Chinese)
[3] 熊琦,竞小伟,詹峰.美国石油天然气行业ICS系统信息安全工作综述及对我国的启示[J].中国信息安全,2012,27(03):80-83. Xiong Qi,Jing Xiaowei,Zhan Feng.Summary and implications for China of the information security work of the ICS system in the oil and gas industry in America[J].China Information Security,2012,27(3):80-83.(in Chinese)
[4] 2013 工业控制系统及其安全性研究报告[EB/OL].http://www.nsfocus.com/4_research/4_6.html,2013-06-24.
[5] 孙大林,蒋大明.Modbus/TCP的安全性及其在工业监控系统中的应用[J].中国安全生产科学技术,2006,2(2):92-95. Sun Da-lin,Jiang Da-ming.Modbus/TCP protocol safety and its application in industrial monitoring and control system[J].Journal of Safety Science and Technology,2006,2(2):92-95.(in Chinese)
[6] 王婷婷.SCADA系统中数据传输安全性研究[D].上海:华东理工大学,2012. Wang Tingting.Security research on SCADA system data transmission[D].Shanghai:East China University of Science and Technology,2012.(in Chinese)
[7] 张云贵,赵华,王丽娜.基于工业控制模型的非参数CUSUM入侵检测方法[J].东南大学学报(自然科学版),2012,42(S1):55-59. Zhang Yungui,Zhao Hua,Wang Lina.A non-parametric CUSUM intrusion detection method based on industrial control model[J].Journal of Southeast University (Natural Science Edition),2012,42(S1):55-59.(in Chinese)
[8] Javier J.Using SNORT for intrusion detection in MODBUSTCP/IP communications[EB/OL].http://www.giac.org/paper/gcia/7218/snort-intrusion-detection-modbus-tcp-ip-communications/124438,2013-08-30.
[9] Venkat P,Matthew F.Transparent Modbus TCP Filtering with Linux[EB/OL].http://modbusfw.Sourceforge.net,2013-08-30..
[10] 夏春明,刘涛,王华忠,等.工业控制系统信息安全现状及发展趋势[J].信息安全与技术,2013,2:13-17. Xia Chun-ming,Liu Tao,Wang Hua-zhong,et al.Industrial control system security analysis[J].Information Security and Technology,2013,2:13-17.(in Chinese)
[11] GB/T 19582.1-2008.基于Modbus协议的工业自动化网络规范第1部分:Modbus应用协议[S].
[12] GB/T 19582.3-2008.基于Modbus协议的工业自动化网络规范第3部分:Modbus协议在TCP/IP上的实现指南[S].
[13] Eric K.Industrial Network Security securing Critical Infrastructure Networks for Smart Grid,SCADA,and Other Industrial Control System[M].Syngress,2011.
[14] Peter H Rodrigo C,Mauricio P,et al.Attack taxonomies for the Modbus protocols[J].Critical Infrastructure protection,2008,(1):37-44.
[15] 李昆仑,赵俊忠,黄厚宽,田盛丰.基于SVM技术的入侵检测[J].信息与控制,2003,32(6):495-499. Li Kun-lun,Zhao Jun-zhong,Huang Hou-kuan,et al.An intrusion detection method based on SVM[J].Information and Control,2003,32(6):495-499.(in Chinese)
[16] 邬俊,鲁明羽,刘闯.基于混合学习框架的SVM反馈算法研究[J].电子学报,2010,38(9):2101-2106. Wu Jun,Lu Ming-yu,Liu Chuang.SVM-based scheme within hybrid learning framework for image retrieval[J].Acta Electronica Sinica,2010,38(9):2101-2106.(in Chinese)
[17] 陈国初,俞金寿.微粒群优化算法[J].信息与控制,2005,34(3):318-323. Chen Guo-chu,Yu Jin-shou.Particle swarm optimization algorithm[J].Information and Control,2005,34(3):318-323.(in Chinese)
[18] Jiang B,Wang N,Wang LP.Particle swarm optimization with age-group topology for multimodal functions and data clustering[J].Communications in Nonlinear Science and Numerical Simulation,2013,18(11):3134-3145.
[19] Cabrerizo FJ,Herrera-Viedma E,Pedrycz W.A method based on PSO and granular computing of linguistic information to solve group decision making problems defined in heterogeneous contexts[J].European Journal of Operational Research,2013,230(3):624-633.
[20] 张学工.关于统计学习理论与支持向量机[J].自动化学报,2000,26(1):32-40. Zhang Xuegong.Introduction to statistical learning theory and support vector machine[J].Acta Automation,2000,26(1):32-40.(in Chinese)
[21] 李林,张晓龙.基于RBF核的SVM学习算法的优化计算[J].计算机工程与应用,2006(29):190-204. Li Lin,Zhang Xiao-long.Optimization of SVM with RBF kernel[J].Computer Engineering and Applications,2006(29):190-204.(in Chinese) |