Ruijun et al., 2021 - Google Patents

Research on Industrial Control Network Security Based on Automatic Machine Learning

Ruijun et al., 2021

Document ID
12194734644655528005
Author
Ruijun Y
Lijun H
Xueqi H
Bin Z
Publication year
Publication venue
2021 6th International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)

External Links

Snippet

Aiming at the problem of complex parameter configuration and slow effective model construction in industrial control system attack identification, starting from the study of the whole process of machine learning, an automatic machine learning (AUTOML) attack …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/12Computer systems based on biological models using genetic models
    • G06N3/126Genetic algorithms, i.e. information processing using digital simulations of the genetic system

Similar Documents

Publication Publication Date Title
Peng et al. An improved feature selection algorithm based on ant colony optimization
Zhang et al. Intrusion detection of industrial internet-of-things based on reconstructed graph neural networks
Liu et al. Functions-based CFG embedding for malware homology analysis
Ismaila Model and Algorithm in Artificial Immune System for Spam Detection
CN115964503B (en) Safety risk prediction method and system based on community equipment facilities
Ruijun et al. Research on Industrial Control Network Security Based on Automatic Machine Learning
Ma et al. Cyevent2vec: Attributed heterogeneous information network based event embedding framework for cyber security events analysis
CN118297158A (en) Coal mine safety risk inference method, system, equipment and storage medium
Umair et al. Energy theft detection in smart grids with genetic algorithm-based feature selection
Ananthi et al. Ensemble based Intrusion Detection System for IoT Device
Amro et al. Evolutionary computation in computer security and forensics: An overview
Wan et al. State-based control feature extraction for effective anomaly detection in process industries
Zhang A heuristic genetic neural network for intrusion detection
Li et al. Survey on methodology of intrusion detection in industrial control system based on artificial intelligence
ZHANG et al. Integrated intrusion detection model based on artificial immune
Murugesan et al. Mitigating Missing Rate and Early Cyberattack Discrimination Using Optimal Statistical Approach with Machine Learning Techniques in a Smart Grid
Zhang et al. An Intelligent Network Intrusion Detector Using Deep Learning Model
Cuzzocrea et al. Clustering-based spatio-temporal analysis of big atmospheric data
Lu et al. Anomaly Recognition Method for Massive Data of Power Internet of Things Based on Bayesian Belief Network
Abdessemed et al. Forest Fire prediction using Machine Learning Methods
Shokripoor Bahman Bigloo A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Chen Optimal design of computer network security performance based on genetic algorithm
Zhang et al. A Malicious Attack Correlation Analysis Method Integrating Interaction Process of Source-Grid-Load System
Wang et al. Power Transformer Fault Prediction Based on Knowledge Graphs
Shen et al. Prediction of minimum ignition energy for combustible dust using graph neural networks and SMILES data augmentation