An optimization technique for intrusion detection of industrial control network vulnerabilities based on BP neural network
暂无分享,去创建一个
[1] K. A. Kumari,et al. Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems , 2021, Big Data.
[2] Daniel Fraunholz,et al. The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities Around the World , 2021, IEEE Internet of Things Journal.
[3] Mohammad Shabaz,et al. Taxonomy of Adaptive Neuro-Fuzzy Inference System in Modern Engineering Sciences , 2021, Comput. Intell. Neurosci..
[4] Chinmay Chakraborty,et al. Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection , 2021, Wirel. Commun. Mob. Comput..
[5] Mohammad Shabaz,et al. Image Fusion Algorithm at Pixel Level Based on Edge Detection , 2021, Journal of healthcare engineering.
[6] Mohammad Shabaz,et al. A New Face Image Recognition Algorithm Based on Cerebellum-Basal Ganglia Mechanism , 2021, Journal of healthcare engineering.
[7] Shyam Deshmukh,et al. Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework , 2021, Secur. Commun. Networks.
[8] Chirag Sharma,et al. A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application , 2021 .
[9] Aditya Khamparia,et al. An Enhanced Secure Deep Learning Algorithm for Fraud Detection in Wireless Communication , 2021, Wirel. Commun. Mob. Comput..
[10] Subhendu Kumar Pani,et al. MBCP: Performance Analysis of Large Scale Mainstream Blockchain Consensus Protocols , 2021, IEEE Access.
[11] Wenli Shang,et al. A Test Cases Generation Method for Industrial Control Protocol Test , 2021, Sci. Program..
[12] Nia Nuraeni,et al. High Accuracy in Forex Predictions Using the Neural Network Method Based on Particle Swarm Optimization , 2020, Journal of Physics: Conference Series.
[13] Jing Liu,et al. Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer , 2020, Sensors.
[14] M. Shafiq,et al. Investigating the Impact of Emotional Intelligence on Academic Performance of Engineering Students: An Exploratory Study in Pakistan , 2020 .
[15] 峰 徐. Research on Intrusion Detection of Industrial Control System Based on Deep Convolution Network and K-Means , 2020, Computer Science and Application.
[16] D. P. Zegzhda,et al. Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series , 2019, Automatic Control and Computer Sciences.
[17] Yingxu Lai,et al. Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network , 2019, Secur. Commun. Networks.
[18] Peng Lin,et al. An Intrusion Detection Method for Industrial Control System Based on Gate Recurrent Unit , 2019, Journal of Physics: Conference Series.
[19] Zhanwei Song,et al. Abnormal detection method of industrial control system based on behavior model , 2019, Comput. Secur..
[20] B. Prasanalakshmi,et al. Two-Way Handshake User Authentication Scheme for e-Banking System , 2019 .
[21] Ibrahim Ozcelik,et al. Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection , 2019, IEEE Access.
[22] Zhang Yuxia. Optimization calculation of well function W (u, r/B) based on BP neural network , 2019, E3S Web of Conferences.
[23] Hui Zhao,et al. An Intelligent Fuzzing Data Generation Method Based on Deep Adversarial Learning , 2019, IEEE Access.
[24] Lin Li,et al. Intrusion detection algorithm based on OCSVM in industrial control system , 2016, Secur. Commun. Networks.
[25] A. Kannammal,et al. ECC Based Biometric Encryption of Compressed Image for Security over Network Channels , 2013 .
[26] A. Kannammal,et al. Multimodal Biometric Cryptosystem Involving Face, Fingerprint and Palm Vein , 2011 .
[27] Moeen Rajput,et al. Analysis of Factors Affecting the Stress Level of Engineering Students , 2010 .
[28] M. Kohara,et al. A test cases generation method for FSM with counters and its fault coverage evaluation using a mutant generator , 1997, 1997 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM. 10 Years Networking the Pacific Rim, 1987-1997.