[1]
Q. Z. Wei, Industrial network control system security and management, Measurement & Control Technology, vol. 32, no. 2, pp.87-92, (2013).
Google Scholar
[2]
Y. Peng, C. Q. Jiang, and F. Xie, Industrial control system cyber security research, Journal of Tsinghua University (Sci & Tech), vol. 52, no. 10, pp.1396-1405, (2013).
Google Scholar
[3]
Q. Xiong, X. W. Jing, and F. Zhan, Summary and implications for China of the information security work of the ICS system in the oil and gas industry in America, China Information Security, vol. 27, no. 3, pp.80-83, (2012).
Google Scholar
[4]
V. M. Igure, S. A. Laughter, R. D. Williams, Security issues in SCADA networks, Computers & Security, vol. 25, issue 7, pp.498-506, (2006).
DOI: 10.1016/j.cose.2006.03.001
Google Scholar
[5]
D. L. Sun and D. M. Jiang, Modbus/TCP protocol safety and its application in industrial monitoring and control system, Journal of Safety Science and Technology, vol. 2, no. 2, pp.92-95, (2006).
Google Scholar
[6]
T. T. Wang, Security Research on SCADA system data transmission, M.S. thesis, Dept. Electron. Chinese, East China University of Science and Technology, Shanghai, China, (2012).
Google Scholar
[7]
Y. G. Zhang, H. Zhao, and L. N. Wang, A non-parametric CUSUM intrusion detection method based on industrial control model, Journal of Southeast University (Natural Science Edition), vol. 42, no. 1, pp.55-59, (2012).
Google Scholar
[8]
J. Javier (July, 2011). Using SNORT for intrusion detection in MODBUSTCP/IP communications. [Online]. Available: http: /www. giac. org/paper/gcia/7218/snort-intrusion-detection-modbus-tcp-ip-communications/124438.
Google Scholar
[9]
P. Venkat and F. Matthew. Transparent Modbus TCP filtering with Linux [Online]. Available: http: /modbusfw. sourceforge. net.
Google Scholar
[10]
C. M. Xia, T. Liu, H. Z. Wang et al., Industrial control system security analysis, Information Security and Technology, no. 2, pp.13-17, (2013).
Google Scholar
[11]
Modbus Industrial Automation Network Specification—Part 1: Modbus Application Protocol, GB/T 19582. 1-(2008).
Google Scholar
[12]
Modbus Industrial Automation Network Specification —Part 3:Modbus Protocol Implementation Guide Over TCP/IP, GB/T 19582. 3-(2008).
Google Scholar
[13]
E. Kanpp, Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and other Industrial Control System, MA: Syngress, 2011, ch. 4, pp.55-60.
Google Scholar
[14]
P. Huitsing, R. Chandia, M. Papa et al., Attack taxonomies for the Modbus protocols, International Journal of Critical Infrastructure Protection, vol. 1, pp.37-44, (2008).
DOI: 10.1016/j.ijcip.2008.08.003
Google Scholar
[15]
K. L. Li, J. Z. Zhao, H. K. Huang et al., An intrusion detection method based on SVM, Information and Control, vol. 32, no. 6, pp.495-499, (2003).
Google Scholar
[16]
G. C. Chen and J. S. Yu, Particle swarm optimization algorithm, Information and Control, vol. 34, no. 3, pp.318-323, (2005).
Google Scholar
[17]
B. Jiang, N. Wang, and L. P. Wang, Particle swarm optimization with age-group topology for multimodal functions and data clustering, Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 11, pp.3134-3145, (2013).
DOI: 10.1016/j.cnsns.2013.03.011
Google Scholar
[18]
F. J. Cabrerizo, E. Herrera-Viedma, and W. Pedrycz, A method based on PSO and granular computing of linguistic information to solve group decision making problems defined in heterogeneous contexts, European Journal of Operational Research, vol. 230, no. 3, pp.624-633, (2013).
DOI: 10.1016/j.ejor.2013.04.046
Google Scholar
[19]
X. G. Zhang, Introduction to Statistiacl Learning Theory and Support Vector Machines, ACTA Automation, no. 1, pp.32-40, (2006).
Google Scholar
[20]
L. Li and X. L. Zhang, Optimization of SVM with RBF kernel, Computer Engineering and Applications, no. 29, pp.190-204, (2006).
Google Scholar