Network intrusion detection based on lightning search algorithm optimized extreme learning machine

C Wang, W Cai, Z Ye, L Yan, P Wu… - 2018 13th International …, 2018 - ieeexplore.ieee.org
In order to guarantee the security of the network, a lightning search algorithm optimized
extreme learning machine (LSA-ELM) method is proposed in this paper, aiming at the …

Research on false data injection attack detection of s mart grid based on machine learning

Z Tao, W Zhan - Journal of Physics: Conference Series, 2020 - iopscience.iop.org
The safe and reliable operation of power systems is an important guarantee for the healthy
development of the national economy. Industry and people's lives are inseparable from …

Generalized Likelyhood Ratio based Detection on Cyber-Attacks

H Wu, D Zhang - … 37th Youth Academic Annual Conference of …, 2022 - ieeexplore.ieee.org
In this paper, a generalized likelihood ratio based detection algorithm with a statistical
method for threshold setting is proposed to detect cyber-attacks on a unified remote control …

[HTML][HTML] Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization

X Gao, Y Zhou, L Xu, D Zhao - Entropy, 2022 - mdpi.com
With the rapid development of Industrial Internet of Things technology, the industrial control
system (ICS) faces more and more security threats, which may lead to serious risks and …

[引用][C] 入侵检测技术在微机监测网络中的应用研究

曹宏丽 - 2011 - 兰州: 兰州交通大学

Lorenz 混沌异步跟踪深度伪装网络攻击信号最优检测

李学善 - 科技通报, 2013 - cqvip.com
提出采用Lorenz 混沌系统异步跟踪优化期望最大化高斯混合模型算法实现对低信噪比下深度
伪装的网络攻击信号最优检测. 通过提取待检测网络数据流参数向量和正常数据流参数向量的差 …

A novel covert agent for stealthy attacks on industrial control systems using least squares support vector regression

W Li, L Xie, Z Wang - Journal of Electrical and Computer …, 2018 - Wiley Online Library
Research on stealthiness has become an important topic in the field of data integrity (DI)
attacks. To construct stealthy DI attacks, a common assumption in most related studies is that …

A Reinforcement Learning-Based Controller Designed for Intersection Signal Suffering from Information Attack

L Ye, K Gao, S Huang, H Huang, R Du - International Conference on …, 2023 - Springer
With the rapid development of smart technology and wireless communication technology,
Intelligent Transportation System (ITS) is considered as an effective way to solve the traffic …

[引用][C] 信息物理系统安全理论研究

张恒 - 2015 - 杭州: 浙江大学

[图书][B] Security of cyber-physical systems: State estimation and control

C Wu, W Yao, G Sun, L Wu - 2022 - Springer
The past decades have witnessed a great development of the control theory, the
communication technology, the computer science, smart devices and so on, which make it …