V. Igure, S. Laughter, and R. Williams, Security issues in SCADA networks, Computers & Security, vol.25, issue.7, pp.498-506, 2006.
DOI : 10.1016/j.cose.2006.03.001

J. Slay and M. Miller, Lessons Learned from the Maroochy Water Breach, International Federation for Information Processing, vol.253, p.73, 2008.
DOI : 10.1007/978-0-387-75462-8_6

W. D. Beckner, NRC Information Notice 2003-14: Potential Vulnerability of Plant Computer Network to Worm Infection, 2003.

E. Luiijf, SCADA Security Good Practices for the Drinking Water Sector, 2008.

K. Stouffer, J. Falco, and K. Kent, Guide to supervisory control and data acquisition (SCADA) and industrial control systems security, 2006.

E. Naess, D. Frincke, A. Mckinnon, and D. Bakken, Configurable Middleware-Level Intrusion Detection for Embedded Systems, 25th IEEE International Conference on Distributed Computing Systems Workshops, pp.144-151, 2005.
DOI : 10.1109/ICDCSW.2005.52

A. Valdes and S. Cheung, Intrusion Monitoring in Process Control Systems, Proceedings of the Forty-Second Hawaii International Conference on System Sciences, p.17, 2009.

A. Cárdenas, S. Amin, and S. Sastry, Research challenges for the security of control systems, Proceedings of 3rd USENIX workshop on Hot Topics in Security (HotSec), 2008.

J. Rrushi and K. D. Kang, Detecting Anomalies in Process Control Networks, Critical Infrastructure Protection III: Third IFIP WG 11. 10 International Conference, pp.151-165, 2009.
DOI : 10.1145/235025.235031

J. Kannan, J. Jung, V. Paxson, and C. Koksal, Semi-automated discovery of application session structure, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, p.132, 2006.
DOI : 10.1145/1177080.1177096