SOOYEON S, TAEKYOUNG K, JO Gil-yong, et al. An experimental study of hierarchical intrusion detection for wireless industrial sensor networks[J]. IEEE Transaction on Industrial Informatics, 2012, 6(4): 744-757.
[2]
RICK A J, BARRY H. A system-aware cyber security architecture[J]. Systems Engineering, 2012, 15 (2): 225-240.
LIU Fang, MAO Zhi-zhong, LI Lei. Outlier detection for control process data based on fuzzy ARHMM[J]. Chinese Journal of Scientific Instrument, 2010, 31(5): 984-990. (in Chinese)
[5]
CHIARA B, MIGUEL á Sanz-bobi. Auto-regressive processes explained by self-organized maps: application to the detection of abnormal behavior in industrial processes[J]. IEEE Transactions on Neural Networks, 2011, 22(12): 2078-2090.
[6]
MIN W, KEECHEON K. Intrusion detection scheme using traffic prediction for wireless industrial networks[J]. Journal of Communications and Networks, 2012, 14(3): 310-318.
HOU Chong-yuan, JIANG Han-hong, RUI Wan-zhi, et al. A probabilistic principal component analysis approach for detecting traffic anomaly in industrial networks[J]. Journal of Xi'an Jiaotong University, 2012, 46(2): 70-75. (in Chinese)
CHEN Fei, GAO Tie-mei. The application of the structure time series model on seasonal adjustment[J]. Systems Engineering-Theory & Practice, 2007 (11): 7-14. ( in Chinese)
[11]
FARZANEH K, DEREK W M, AMIR K K. Wireless data traffic estimation using a state-space model[J]. IEEE Transactions on Vehicular Technology, 2008, 57 (6): 3885-3890.
[12]
NICOLAS F, LIAM O M, ERIC C. W32. Stuxnet dossier [EB/OL]. [2011-02-11]. http://www. symanrec. com/content/en/us/enterprise/media/ security _ response/ whi-tepapers/ w32_stuxnet_dossier. pdf.
[13]
ALEKSANDR M, EUGENE R, DAVID H, et al. Stuxnet under the microscope[EB/OL]. [2010-7-19]. http://www. eset. com/ resources/ white-papers/ Stuxnet-Under-the-Microscope. pdf.
[14]
BéLA G, CHRISTOS S, IGOR N F, et al. A cyber-physical experimentation environment for the security analysis of networked industrial control systems[J]. Computers and Electrical Engineering, 2012, 38 (5):1146-1161.