Security issues in SCADA networks, Computers & Security, vol.25, issue.7, pp.498-506, 2006. ,
DOI : 10.1016/j.cose.2006.03.001
Lessons Learned from the Maroochy Water Breach, International Federation for Information Processing, vol.253, p.73, 2008. ,
DOI : 10.1007/978-0-387-75462-8_6
NRC Information Notice 2003-14: Potential Vulnerability of Plant Computer Network to Worm Infection, 2003. ,
SCADA Security Good Practices for the Drinking Water Sector, 2008. ,
Guide to supervisory control and data acquisition (SCADA) and industrial control systems security, 2006. ,
Configurable Middleware-Level Intrusion Detection for Embedded Systems, 25th IEEE International Conference on Distributed Computing Systems Workshops, pp.144-151, 2005. ,
DOI : 10.1109/ICDCSW.2005.52
Intrusion Monitoring in Process Control Systems, Proceedings of the Forty-Second Hawaii International Conference on System Sciences, p.17, 2009. ,
Research challenges for the security of control systems, Proceedings of 3rd USENIX workshop on Hot Topics in Security (HotSec), 2008. ,
Detecting Anomalies in Process Control Networks, Critical Infrastructure Protection III: Third IFIP WG 11. 10 International Conference, pp.151-165, 2009. ,
DOI : 10.1145/235025.235031
Semi-automated discovery of application session structure, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, p.132, 2006. ,
DOI : 10.1145/1177080.1177096