Ruijun et al., 2021 - Google Patents
Research on Industrial Control Network Security Based on Automatic Machine LearningRuijun et al., 2021
- Document ID
- 12194734644655528005
- Author
- Ruijun Y
- Lijun H
- Xueqi H
- Bin Z
- Publication year
- Publication venue
- 2021 6th International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)
External Links
Snippet
Aiming at the problem of complex parameter configuration and slow effective model construction in industrial control system attack identification, starting from the study of the whole process of machine learning, an automatic machine learning (AUTOML) attack …
- 238000010801 machine learning 0 title abstract description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/12—Computer systems based on biological models using genetic models
- G06N3/126—Genetic algorithms, i.e. information processing using digital simulations of the genetic system
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Peng et al. | An improved feature selection algorithm based on ant colony optimization | |
Zhang et al. | Intrusion detection of industrial internet-of-things based on reconstructed graph neural networks | |
Liu et al. | Functions-based CFG embedding for malware homology analysis | |
Ismaila | Model and Algorithm in Artificial Immune System for Spam Detection | |
CN115964503B (en) | Safety risk prediction method and system based on community equipment facilities | |
Ruijun et al. | Research on Industrial Control Network Security Based on Automatic Machine Learning | |
Ma et al. | Cyevent2vec: Attributed heterogeneous information network based event embedding framework for cyber security events analysis | |
CN118297158A (en) | Coal mine safety risk inference method, system, equipment and storage medium | |
Umair et al. | Energy theft detection in smart grids with genetic algorithm-based feature selection | |
Ananthi et al. | Ensemble based Intrusion Detection System for IoT Device | |
Amro et al. | Evolutionary computation in computer security and forensics: An overview | |
Wan et al. | State-based control feature extraction for effective anomaly detection in process industries | |
Zhang | A heuristic genetic neural network for intrusion detection | |
Li et al. | Survey on methodology of intrusion detection in industrial control system based on artificial intelligence | |
ZHANG et al. | Integrated intrusion detection model based on artificial immune | |
Murugesan et al. | Mitigating Missing Rate and Early Cyberattack Discrimination Using Optimal Statistical Approach with Machine Learning Techniques in a Smart Grid | |
Zhang et al. | An Intelligent Network Intrusion Detector Using Deep Learning Model | |
Cuzzocrea et al. | Clustering-based spatio-temporal analysis of big atmospheric data | |
Lu et al. | Anomaly Recognition Method for Massive Data of Power Internet of Things Based on Bayesian Belief Network | |
Abdessemed et al. | Forest Fire prediction using Machine Learning Methods | |
Shokripoor Bahman Bigloo | A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems | |
Chen | Optimal design of computer network security performance based on genetic algorithm | |
Zhang et al. | A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System | |
Wang et al. | Power Transformer Fault Prediction Based on Knowledge Graphs | |
Shen et al. | Prediction of minimum ignition energy for combustible dust using graph neural networks and SMILES data augmentation |