Author:
Yang Wei,Fang Yushan,Zhou Xiaoming,Shen Yijia,Zhang Wenjie,Yao Yu
Funder
National Key Research and Development Program of China
Technology project funding from State Grid Corporation of China
Publisher
Springer Science and Business Media LLC
Reference42 articles.
1. Yu, K., Tan, L., Mumtaz, S., Al-Rubaye, S., Al-Dulaimi, A., Bashir, A.K., Khan, F.A.: Securing critical infrastructures: deep-learning-based threat detection in IIoT. IEEE Commun. Mag. 59(10), 76–82 (2021)
2. Zhang, D., Wang, Q.-G., Feng, G., Shi, Y., Vasilakos, A.V.: A survey on attack detection, estimation and control of industrial cyber-physical systems. ISA Trans. 116, 1–16 (2021)
3. Park, M., Oh, H., Lee, K.: Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective. Sensors 19(9), 2148 (2019)
4. Liang, W., Li, K.-C., Long, J., Kui, X., Zomaya, A.Y.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Ind. Inf. 16(3), 2063–2071 (2019)
5. Calderon, P.: Nmap: Network Exploration and Security Auditing Cookbook - Second Edition Network Discovery and Security Scanning at Your Fingertips. Packt Publishing, Birmingham (2017)