1.武汉大学国家网络安全学院,湖北 武汉 430072
2.北京化工大学信息科学与技术学院,北京 100029
3.奇安信科技集团股份有限公司,湖北 武汉 430000
[ "李宏宇(2003‒ ),男,武汉大学国家网络安全学院硕士生,主要研究方向为入侵检测、物联网安全。" ]
[ "李思帆(1999‒ ),男,武汉大学国家网络安全学院博士生,主要研究方向为物联网入侵检测、车载安全以及空天地一体化安全。" ]
[ "王浩翔(2000‒ ),男,武汉大学国家网络安全学院博士生,主要研究方向为工控场景下时间序列异常检测。" ]
[ "王昊天(2002‒ ),男,武汉大学国家网络安全学院硕士生,主要研究方向为物联网网络设备攻击检测。" ]
[ "曹越(1984‒ ),男,博士,武汉大学国家网络安全学院教授、博士生导师,主要研究方向为网络通信、网络安全、交通决策优化。" ]
[ "陈龙(1988‒ ),男,博士,北京化工大学信息科学与技术学院教授、博士生导师,主要研究方向为网络安全、入侵检测。" ]
[ "张宇(1987‒ ),男,奇安信科技集团股份有限公司高级工程师,主要研究方向为网络安全。" ]
收稿:2026-01-28,
修回:2026-02-04,
录用:2026-02-09,
纸质出版:2026-03-30
移动端阅览
李宏宇,李思帆,王浩翔等.面向枢纽通航关基设施业务场景的安全防护技术研究综述[J].物联网学报,2026,10(01):52-68.
Li Hongyu,Li Sifan,Wang Haoxiang,et al.Review of research on security protection technologies for business scenarios in navigation hub infrastructure[J].Chinese Journal on Internet of Things,2026,10(01):52-68.
李宏宇,李思帆,王浩翔等.面向枢纽通航关基设施业务场景的安全防护技术研究综述[J].物联网学报,2026,10(01):52-68. DOI: 10.11959/j.issn.2096-3750.2026.00554.
Li Hongyu,Li Sifan,Wang Haoxiang,et al.Review of research on security protection technologies for business scenarios in navigation hub infrastructure[J].Chinese Journal on Internet of Things,2026,10(01):52-68. DOI: 10.11959/j.issn.2096-3750.2026.00554.
随着我国航运网络的智能化转型,以长江干线为代表的大型枢纽通航设施在数字化赋能下变得高度复杂化和异构化,其网络面临严峻的网络安全威胁,对航运乃至国家战略安全构成了挑战。为了应对这一挑战,基于大型枢纽通航关基设施网络不同安全域的安全需求,提出了一个面向跨域协同范式的安全防护框架,旨在整合不同安全域的防护技术与策略,实现紧密协同和高效响应。深入探讨了大型枢纽通航关基设施跨域联动安全防护技术的研究背景、体系架构、关键技术以及未来的研究重点,为提升大型枢纽通航关基设施的安全能力提供了可行的参考。
With the intelligent transformation of China's shipping network
large navigation hub infrastructures
represented by the Yangtze River trunk line
have become highly complex and heterogeneous under the empowerment of digitalization. These networks face severe cybersecurity threats
posing a challenge to shipping and even national strategic security. To address this challenge
a security protection framework for cross-domain collaboration paradigm was proposed in this paper. The framework aimed to integrate protection technologies and strategies from different security domains to achieve tight collaboration and efficient response. The research background
architectural framework
key technologies
and future research priorities of cross-domain collaborative security protection technology for large navigation hub critical infrastructure were delved
providing feasible references for enhancing its security capabilities.
中华人民共和国交通运输部 . 公路水路关键信息基础设施安全保护管理办法 [A ] . ( 2023-05-06 )[ 2025-06-24 ] .
Ministry of Transport of the People's Republic of China, Measures for the Administration of the Protection of the Critical Information Infrastructure of Highways and Waterways [A ] . ( 2023-05-06 )[ 2025-06-24 ] .
JTS/T 161—2021 船闸信息系统设计规范 [S ] .
JTS/T 161—2021 Design Code of Shiplocks Information System [S ] .
JTS/T 185—2021 内河数字航道工程建设技术规范 [S ] .
JTS/T 185—2021 Technical Specification of Inland Digital Waterway Engineering [S ] .
Kayan H K , Nunes M , Rana O , et al . Cybersecurity of industrial cyber-physical systems: a review [J ] . ACM Computing Surveys , 2022 , 54 ( 11 s): 1 - 35 .
Fei W , Ohno H , Sampalli S . A systematic review of IoT security: research potential, challenges, and future directions [J ] . ACM Computing Surveys , 2024 , 56 ( 5 ): 1 - 40 .
齐俊麟 , 陈冬元 , 吴澎 , 等 . 长江和西江大型船闸通航运行关键技术研究与展望 [J ] . 水运工程 , 2024 ( 1 ): 137 - 143 .
Qi J L , Chen D Y , Wu P , et al . Key technology research and outlook for large ship lock navigationin Xijiang River and the Yangtze River [J ] . Port & Waterway Engineering , 2024 ( 1 ): 137 - 143 .
马兰青 , 张艳 , 赵冲 , 等 . 智慧港口建设关键技术研究与应用综述 [J ] . 现代交通与冶金材料 , 2024 , 4 ( 6 ): 16 - 30 .
Ma L Q , Zhang Y , Zhao C , et al . A review of key technologies in the research and application of smart port development [J ] . Modern Transportation and Metallurgical Materials , 2024 , 4 ( 6 ): 16 - 30 .
JTS 304-2—2019 航运枢纽安全检测与评估技术规范 [S ] .
JTS 304-2—2019 Technical Specification for Safety Detection and Assessment of Navigation Junction [S ] .
Drury B . Control techniques, drives and controls handbook [M ] . Institution of Engineering and Technology , 2009 .
Tuptuk N , Hazell P , Watson J , et al . A systematic review of the state of cyber-security in water systems [J ] . Water , 2021 , 13 ( 1 ): 81 .
亓晋 , 王微 , 陈孟玺 , 等 . 工业互联网的概念、体系架构及关键技术 [J ] . 物联网学报 , 2022 , 6 ( 2 ): 38 - 49 .
Qi J , Wang W , Chen M X , et al . Concept, architecture and key technologies of industrial Internet [J ] . Chinese Journal on Internet of Things , 2022 , 6 ( 2 ): 38 - 49 .
Shanmuga Sundaram J P , Du W , Zhao Z W . A survey on LoRa networking: research problems, current solutions, and open issues [J ] . IEEE Communications Surveys & Tutorials , 2020 , 22 ( 1 ): 371 - 388 .
Xia Y Q , Zhang Y , Dai L , et al . A brief survey on recent advances in cloud control systems [J ] . IEEE Transactions on Circuits and Systems II: Express Briefs , 2022 , 69 ( 7 ): 3108 - 3114 .
Mahnke W , Leitner S H , Damm M . OPC unified architecture [M ] . Berlin, Heidelberg : Springer , 2009 .
Yassein M B , Shatnawi M Q , Aljwarneh S , et al . Internet of things: survey and open issues of MQTT protocol [C ] // Proceedings of the 2017 International Conference on Engineering & MIS (ICEMIS) . Piscataway : IEEE Press , 2017 : 1 - 6 .
DB32/T 4733—2024 数字孪生水网建设总体技术指南 [S ] .
DB32/T 4733—2024 General technical guidelines of the digital twin water network construction [S ] .
Langner R . Stuxnet: dissecting a cyberwarfare weapon [J ] . IEEE Security & Privacy , 2011 , 9 ( 3 ): 49 - 51 .
Geiger M , Bauer J , Masuch M , et al . An analysis of black energy 3, crashoverride, and trisis, three malware approaches targeting operational technology systems [C ] // Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) . Piscataway : IEEE Press , 2020 : 1537 - 1543 .
Cherepanov A . Win32/Industroyer: A new threat for industrial controls systems [R ] . 2017 .
Johnson B , Caban D , Krotofil M , et al . Attackers deploy new ICS attack framework TRITON and cause operational disruption to critical infrastructure [EB ] . ( 2017-12-14 )[ 2025-06-24 ] .
Cherepanov A . Greyenergy A successor to BlackEnergy [R ] . 2018 .
Brubaker N , Lunden K , Proska K , et al . INCONTROLLER: New state-sponsored cyber attack tools target multiple industrial control systems [EB ] . ( 2022-04-13 )[ 2025-06-24 ] .
Olaes T . The Top 8 IT/OT/IoT security challenges and how to solve them [EB ] . ( 2025-03-25 )[ 2025-06-24 ] .
Saßnick O , Rosenstatter T , Schäfer C , et al . STRIDE-based methodologies for threat modeling of industrial control systems: a review [C ] // Proceedings of the 2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems (ICPS) . Piscataway : IEEE Press , 2024 : 1 - 8 .
Khan R , McLaughlin K , Laverty D , et al . STRIDE-based threat modeling for cyber-physical systems [C ] // Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) . Piscataway : IEEE Press , 2017 : 1 - 6 .
Khalil S M , Bahsi H , Dola H O , et al . Threat modeling of cyber-physical systems - a case study of a microgrid system [J ] . Computers & Security , 2023 , 124 : 102950 .
Castiglione L M , Lupu E C . Which attacks lead to hazards? combining safety and security analysis for cyber-physical systems [J ] . IEEE Transactions on Dependable and Secure Computing , 2024 , 21 ( 4 ): 2526 - 2540 .
Lorenzo S F , Añorga J , Arrizabalaga S . A survey of IIoT protocols [J ] . ACM Computing Surveys , 2020 , 53 ( 2 ): 1 - 53 .
Falco G , Caldera C , Shrobe H . IIoT cybersecurity risk modeling for SCADA systems [J ] . IEEE Internet of Things Journal , 2018 , 5 ( 6 ): 4486 - 4495 .
Bringhenti D , Marchetto G , Sisto R , et al . Automation for network security configuration: state of the art and research trends [J ] . ACM Computing Surveys , 2024 , 56 ( 3 ): 1 - 37 .
Bringhenti D , Marchetto G , Sisto R , et al . Improving the formal verification of reachability policies in virtualized networks [J ] . IEEE Transactions on Network and Service Management , 2021 , 18 ( 1 ): 713 - 728 .
Gomes D , Felix E , Aires F , et al . Static code analysis for IoT security: a systematic literature review [J ] . ACM Computing Surveys , 2026 , 58 ( 3 ): 1 - 47 .
Zuo F L , Luo Z X , Yu J Z , et al . Vulnerability detection of ICS protocols via cross-state fuzzing [J ] . IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems , 2022 , 41 ( 11 ): 4457 - 4468 .
Zong X J , Ning B W , Wang G G , et al . ICPGF: an industrial control protocol format-aware and feedback-guided fuzzing [C ] // Proceedings of the 2023 International Conference on Automatics and Informatics (ICAI) . Piscataway : IEEE Press , 2023 : 65 - 70 .
Wanyan H , Lai Y X , Liu J , et al . NCMFuzzer: Using non-critical field mutation and test case combination to improve the efficiency of ICS protocol fuzzing [J ] . Computers & Security , 2024 , 141 : 103811 .
Svacina J , Raffety J , Woodahl C , et al . On vulnerability and security log analysis: a systematic literature review on recent trends [C ] // Proceedings of the International Conference on Research in Adaptive and Convergent Systems . New York : ACM Press , 2020 : 175 - 180 .
Landauer M , Skopik F , Wurzenberger M , et al . System log clustering approaches for cyber security applications: a survey [J ] . Computers & Security , 2020 , 92 : 101739 .
Du M , Li F F , Zheng G N , et al . DeepLog: anomaly detection and diagnosis from system logs through deep learning [C ] // Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security . New York : ACM Press , 2017 : 1285 - 1298 .
Guo H X , Yuan S H , Wu X T . LogBERT: log anomaly detection via BERT [C ] // Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN) . Piscataway : IEEE Press , 2021 : 1 - 8 .
Han X , Yuan S H , Trabelsi M . LogGPT: log anomaly detection via GPT [C ] // Proceedings of the 2023 IEEE International Conference on Big Data (BigData) . Piscataway : IEEE Press , 2023 : 1117 - 1122 .
Le V H , Zhang H Y . Log-based anomaly detection without log parsing [C ] // Proceedings of the 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) . Piscataway : IEEE Press , 2021 : 492 - 504 .
Miranskyy A , Hamou-Lhadj A , Cialini E , et al . Operational-log analysis for big data systems: challenges and solutions [J ] . IEEE Software , 2016 , 33 ( 2 ): 52 - 59 .
Liu R T , Huang N F , Chen C H , et al . A fast string-matching algorithm for network processor-based intrusion detection system [J ] . ACM Transactions on Embedded Computing Systems , 2004 , 3 ( 3 ): 614 - 633 .
Piskac P , Novotny J . Using of time characteristics in data flow for traffic classification [M ] // Managing the Dynamics of Networks and Services . Berlin, Heidelberg : Springer , 2011 : 173 - 176 .
Chung J Y , Park B , Won Y J , et al . Traffic classification based on flow similarity [M ] // IP Operations and Management . Berlin, Heidelberg : Springer , 2009 : 65 - 77 .
Liu S B , Guo L Q , Webb H , et al . Internet of things monitoring system of modern eco-agriculture based on cloud computing [J ] . IEEE Access , 2019 , 7 : 37050 - 37058 .
Liu G X , Shi H , Kiani A , et al . Smart traffic monitoring system using computer vision and edge computing [J ] . IEEE Transactions on Intelligent Transportation Systems , 2022 , 23 ( 8 ): 12027 - 12038 .
He S , Ren W , Zhu T Q , et al . BoSMoS: a blockchain-based status monitoring system for defending against unauthorized software updating in industrial Internet of things [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 2 ): 948 - 959 .
Gehani A , Tariq D . SPADE: support for provenance auditing in distributed environments [M ] // Middleware 2012 . Berlin, Heidelberg : Springer , 2012 : 101 - 120 .
Pasquier T , Han X Y , Goldstein M , et al . Practical whole-system provenance capture [C ] // Proceedings of the 2017 Symposium on Cloud Computing . New York : ACM Press , 2017 : 405 - 418 .
Ji Y , Lee S , Fazzini M , et al . Enabling refinable {cross-host} attack investigation with efficient data flow tagging and tracking [C ] // Proceedings of the 27th USENIX Security Symposium . Baltimore : USENIX , 2018 : 1705 - 1722 .
Yang R Q , Ma S Q , Xu H T , et al . UISCOPE: accurate, instrumentation-free, and visible attack investigation for GUI applications [C ] // Proceedings of the 2020 Network and Distributed System Security Symposium . San Diego : Internet Society , 2020 : 141 .
GhasemiGol M , Takabi H , Ghaemi-Bafghi A . A foresight model for intrusion response management [J ] . Computers & Security , 2016 , 62 : 73 - 94 .
Huang K X , Zhou C J , Tian Y C , et al . Assessing the physical impact of cyberattacks on industrial cyber-physical systems [J ] . IEEE Transactions on Industrial Electronics , 2018 , 65 ( 10 ): 8153 - 8162 .
Bar A , Shapira B , Rokach L , et al . Scalable attack propagation model and algorithms for honeypot systems [C ] // Proceedings of the 2016 IEEE International Conference on Big Data (Big Data) . Piscataway : IEEE Press , 2016 : 1130 - 1135 .
Khosravi M , Ladani B T . Alerts correlation and causal analysis for APT based cyber attack detection [J ] . IEEE Access , 2020 , 8 : 162642 - 162656 .
Wang W B , Yi P , Jiang J F , et al . Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack [J ] . Computers & Security , 2024 , 136 : 103533 .
Li T , Jiang Y , Lin C , et al . DeepAG: attack graph construction and threats prediction with bi-directional deep learning [J ] . IEEE Transactions on Dependable and Secure Computing , 2023 , 20 ( 1 ): 740 - 757 .
Nuaimi M , Fourati L C , Ben Hamed B . Intelligent approaches toward intrusion detection systems for Industrial Internet of things: a systematic comprehensive review [J ] . Journal of Network and Computer Applications , 2023 , 215 : 103637 .
Yao H P , Gao P C , Zhang P Y , et al . Hybrid intrusion detection system for edge-based IIoT relying on machine-learning-aided detection [J ] . IEEE Network , 2019 , 33 ( 5 ): 75 - 81 .
Zolanvari M , Yang Z B , Khan K , et al . TRUST XAI: model-agnostic explanations for AI with a case study on IIoT security [J ] . IEEE Internet of Things Journal , 2023 , 10 ( 4 ): 2967 - 2978 .
丁凯 , 黄宜都 , 陶铭 , 等 . 基于联邦强化学习的面向边缘网络的入侵检测方法研究 [J ] . 物联网学报 , 2024 , 8 ( 4 ): 140 - 155 .
Ding K , Huang Y D , Tao M , et al . Research on intrusion detection method for edge networks based on federated reinforcement learning [J ] . Chinese Journal on Internet of Things , 2024 , 8 ( 4 ): 140 - 155 .
Abdel-Basset M , Chang V , Hawash H , et al . Deep-IFS: intrusion detection approach for industrial Internet of things traffic in fog environment [J ] . IEEE Transactions on Industrial Informatics , 2021 , 17 ( 11 ): 7704 - 7715 .
Al-Hawawreh M , Sitnikova E , Aboutorab N . X-IIoTID: a connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of things [J ] . IEEE Internet of Things Journal , 2022 , 9 ( 5 ): 3962 - 3977 .
Ferrag M A , Friha O , Hamouda D , et al . Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning [J ] . IEEE Access , 2022 , 10 : 40281 - 40306 .
Zolanvari M , Teixeira M A , Gupta L , et al . Machine learning-based network vulnerability analysis of industrial Internet of Things [J ] . IEEE Internet of Things Journal , 2019 , 6 ( 4 ): 6822 - 6834 .
Hussain S , Ullah S S , Uddin M , et al . A comprehensive survey on signcryption security mechanisms in wireless body area networks [J ] . Sensors , 2022 , 22 ( 3 ): 1072 .
王利朋 , 高健博 , 李青山 , 等 . 应用区块链的多接收者多消息签密方案 [J ] . 软件学报 , 2021 , 32 ( 11 ): 3606 - 3627 .
Wang L P , Gao J B , Li Q S , et al . Blockchain-based multi-recipient multi-message signcryption scheme [J ] . Journal of Software , 2021 , 32 ( 11 ): 3606 - 3627 .
Zhao Y N , Wang Y P , Liang Y H , et al . Identity-based broadcast signcryption scheme for vehicular platoon communication [J ] . IEEE Transactions on Industrial Informatics , 2023 , 19 ( 6 ): 7814 - 7824 .
Zhong H , Zhang S , Cui J , et al . Broadcast encryption scheme for V2I communication in VANETs [J ] . IEEE Transactions on Vehicular Technology , 2022 , 71 ( 3 ): 2749 - 2760 .
Hou Y Z , Cao Y , Xiong H , et al . Heterogeneous broadcast signcryption scheme with equality test for IoVs [J ] . IEEE Transactions on Vehicular Technology , 2024 , 73 ( 12 ): 19550 - 19564 .
李建华 . 网络空间威胁情报感知、共享与分析技术综述 [J ] . 网络与信息安全学报 , 2016 , 2 ( 2 ): 16 - 29 .
Li J H . Overview of the technologies of threat intelligence sensing, sharing and analysis in cyber space [J ] . Chinese Journal of Network and Information Security , 2016 , 2 ( 2 ): 16 - 29 .
Zhu Z Y , Dumitras T . ChainSmith: automatically learning the semantics of malicious campaigns by mining threat intelligence reports [C ] // Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P) . Piscataway : IEEE Press , 2018 : 458 - 472 .
Dionisio N , Alves F , Ferreira P M , et al . Cyberthreat detection from twitter using deep neural networks [C ] // Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN) . Piscataway : IEEE Press , 2019 : 1 - 8 .
Zhao J , Yan Q B , Li J X , et al . TIMiner: automatically extracting and analyzing categorized cyber threat intelligence from social data [J ] . Computers & Security , 2020 , 95 : 101867 .
Pingle A , Piplai A , Mittal S , et al . RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement [C ] // Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining . New York : ACM Press , 2020 : 879 - 886 .
Grigoriadis C , Berzovitis A M , Stellios I , et al . A cybersecurity ontology to support risk information gathering in cyber-physical systems [M ] //Computer Security. ESORICS 2021 International Workshops . Cham : Springer International Publishing , 2022 : 23 - 39 .
Gao P , Liu X Y , Choi E , et al . A system for automated open-source threat intelligence gathering and management [C ] // Proceedings of the 2021 International Conference on Management of Data . New York : ACM Press , 2021 : 2716 - 2720 .
Amthor P , Fischer D , Kühnhauser W E , et al . Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems [C ] // Proceedings of the 14th International Conference on Availability, Reliability and Security . New York : ACM Press , 2019 : 1 - 10 .
Syed N F , Shah S W , Shaghaghi A , et al . Zero trust architecture (ZTA): a comprehensive survey [J ] . IEEE Access , 2022 , 10 : 57143 - 57179 .
Li M Y , Meng Y , Liu J Y , et al . When CSI meets public WiFi: inferring your mobile phone password via WiFi signals [C ] // Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security . New York : ACM Press , 2016 : 1068 - 1079 .
Shah S W , Kanhere S S , Zhang J , et al . VID: human identification through vein patterns captured from commodity depth cameras [J ] . IET Biometrics , 2021 , 10 ( 2 ): 142 - 162 .
魏忠诚 , 陈炜 , 董延虎 , 等 . 基于Wi-Fi感知的多用户身份识别研究 [J ] . 物联网学报 , 2024 , 8 ( 1 ): 111 - 121 .
Wei Z C , Chen W , Dong Y H , et al . Research on multi-user identity recognition based on Wi-Fi sensing [J ] . Chinese Journal on Internet of Things , 2024 , 8 ( 1 ): 111 - 121 .
Chen D J , Zhang N , Qin Z , et al . S2M: a lightweight acoustic fingerprints-based wireless device authentication protocol [J ] . IEEE Internet of Things Journal , 2017 , 4 ( 1 ): 88 - 100 .
Riad K , Cheng J R . Adaptive XACML access policies for heterogeneous distributed IoT environments [J ] . Information Sciences , 2021 , 548 : 135 - 152 .
Trabelsi R , Fersi G , Jmaiel M . Access control in Internet of things: a survey [J ] . Computers & Security , 2023 , 135 : 103472 .
Carrera-Rivera A , Larrinaga F , Lasa G . Context-awareness for the design of Smart-product service systems: Literature review [J ] . Computers in Industry , 2022 , 142 : 103730 .
Hausken K . Cyber resilience in firms, organizations and societies [J ] . Internet of Things , 2020 , 11 : 100204 .
Al Maruf A , Niu L Y , Clark A , et al . A timing-based framework for designing resilient cyber-physical systems under safety constraint [J ] . ACM Transactions on Cyber-Physical Systems , 2023 , 7 ( 3 ): 1 - 25 .
Shoukry Y , Nuzzo P , Puggelli A , et al . Secure state estimation for cyber-physical systems under sensor attacks: a satisfiability modulo theory approach [J ] . IEEE Transactions on Automatic Control , 2017 , 62 ( 10 ): 4917 - 4932 .
Alhelou H H , Nagpal N , Nagpal H , et al . Dynamic state estimation for improving observation and resiliency of interconnected power systems [J ] . IEEE Transactions on Industry Applications , 2024 , 60 ( 2 ): 2366 - 2380 .
Li X , Zhou C J , Tian Y C , et al . A dynamic decision-making approach for intrusion response in industrial control systems [J ] . IEEE Transactions on Industrial Informatics , 2019 , 15 ( 5 ): 2544 - 2554 .
Pradhan S , Dubey A , Levendovszky T , et al . Achieving resilience in distributed software systems via self-reconfiguration [J ] . Journal of Systems and Software , 2016 , 122 : 344 - 363 .
Ding F , Li H D , Luo F , et al . DeepPower: non-intrusive and deep learning-based detection of IoT malware using power side channels [C ] // Proceedings of the 15th ACM Asia Conference on Computer and Communications Security . New York : ACM Press , 2020 : 33 - 46 .
Bhole M , Kastner W , Sauter T . IT security solutions for IT/OT integration: identifying gaps and opportunities [C ] // Proceedings of the 2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA) . Piscataway : IEEE Press , 2024 : 1 - 8 .
Ericson A , Thar K , Forsström S . Enhancing intrusion detection in CPS and IIoT with lightweight explainable AI models [C ] // Proceedings of the 2025 IEEE 21st International Conference on Factory Communication Systems (WFCS) . Piscataway : IEEE Press , 2025 : 1 - 8 .
0
浏览量
63
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621