[1] |
WEN Tao, COSTAS C, CHEN Lei, et al. Access point deployment optimization in CBTC data communication system[J]. IEEE Transactions on Intelligent Transportation Systems, 2018, 19(6):1985-1995.
|
[2] |
赖英旭, 刘增辉, 蔡晓田,等. 工业控制系统入侵检测研究综述[J]. 通信学报, 2017, 38(2):143-156.LAI Yingxu, LIU Zenghui, CAI Xiaotian, et al. A survey of intrusion detection research in industrial control systems[J]. Journal of Communications, 2017, 38(2):143-156.
|
[3] |
MELARAGNO A, BANDARA K, FEWELL A, et al. Rail radio intrusion detection system (RRIDS) for communication based train control (CBTC)[C]. 2016 IEEE International Conference on Intelligent Rail Transportation (ICIRT), 2016:39-48.
|
[4] |
YANG Qingyu, YANG Jie, YU Wei, et al. On false data-injection attacks against power system state estimation: modeling and countermeasures[J]. IEEE Transactions on Parallel & Distributed Systems, 2013, 25(3):717-729.
|
[5] |
ANDRYSIAK T, SAGANOWSKI L, MAZURCZYK W. Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average[J]. EURASIP Journal on Wireless Communications and Networking, 2016, 2016(1):245.
|
[6] |
ZHU Li, YU F R, NING Bing, et al. Cross-layer handoff design in MIMO-enabled WLANs for communication-based train control (CBTC) systems[J]. IEEE Journal on Selected Areas in Communications, 2012, 30(4):719-728.
|
[7] |
PATCHA A, PARK J M. An overview of anomaly detection techniques: Existing solutions and latest technological trends[J]. Computer Networks, 2007, 51(12):3 448-3 470.
|
[8] |
BAKIR S T. Distribution-free quality control charts based on signed-rank-like statistics[J]. Communications in Statistics-Theory and Methods, 2006, 35(4):743-757.
|
[9] |
ZHOU Zhihua, JIANG Yuan. Medical diagnosis with C4. 5 rule preceded by artificial neural network ensemble[J]. IEEE Transactions on Information Technology in Biomedicine, 2003, 7(1):37-42.
|
[10] |
KAPIL M, PATKA S, THOOL R. An overview of intrusion detection based on data mining techniques[C]. 2013 International Conference on Communication Systems and Network Technologies, 2013:626-629.
|
[11] |
MANSINGH G, OSEI K M, REICHGELT H. Using ontologies to facilitate post-processing of association rules by domain experts[J]. Information Sciences, 2011, 181(3):419-434.
|
[12] |
LI Jinbo, WITOLDP, IQBAL J. Multivariate time series anomaly detection: a framework of hidden markov models[J]. Applied Soft Computing, 2017, 60(1): 229-240.
|
[13] |
LI Zefang, FANG Huajing, HUANG Ming. Diversified learning for continuous hidden Markov models with application to fault diagnosis[J]. Expert Systems with Applications, 2015, 42(23): 9 165-9 173.
|
[14] |
YE Nong, SEAN V, CHEN Qiang. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data[J]. IEEE Transactions on Reliability, 2003, 52(1):75-82.
|