Cyber-terrorism : a threat to Australia? Managing Modern Organisation with Information Technology-Information Resources Management Association (IRMA), Idea Group Publishing, pp.472-475, 2005. ,
Safeguarding Australia from Cyber-terrorism : A Proposed Cyberterrorism SCADA Risk Framework for Industry Adoption Keywords, Proc. 10th Aust. Inf. Warf. Secur. Conf. Ed. Cowan Univ. Perth West. Aust, pp.369-384, 2009. ,
Critical Infrastructure Protection : Survey of World-Wide Activities, 2004. ,
Impact of the Stuxnet Virus On Industrial Control System. XIII International forumModern information society formationproblems, perspectives, innovation approaches, pp.5-10, 2011. ,
SKMA ? A Key Management Architecture for SCADA Systems Proceedings of the 2006 Australasian workshops on Grid computing and e-research, pp.183-192, 2006. ,
McAfee: Why Duqu is a big deal ,
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems, Proceedings of the 2004 Winter Simulation Conference, 2004., pp.300-308, 2004. ,
DOI : 10.1109/WSC.2004.1371330
Stuxnet and the Future of Cyber War, Survival, vol.53, issue.1, pp.23-40, 2011. ,
DOI : 10.1080/00396338.2011.555586
On building secure SCADA systems using security patterns Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies -CSIIRW '09, p.17, 2009. ,
Scada systems: vulnerabilities and remediation, J. Comput. Sci. Coll, vol.20, issue.4, pp.160-168, 2005. ,
Development of the PowerCyber SCADA Security Testbed [ Extended Abstract, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp.1-4, 2010. ,
Gauss: Abnormal Distribution ,
Framework for SCADA Security Policy, 2005. ,
Software and Cold War: The Siberian Pipeline Explosion, http://defsecnet.com/software-and-cold-war-the-siberian-pipeline-explosion ,
A Survey of SCADA and Critical Infrastructure Incidents Proceedings of the 1st Annual conference on Research in information technology -RIIT '12, p.51, 2012. ,
SCADA security in the light of Cyber-Warfare, Computers & Security, vol.31, issue.4, pp.418-436, 2012. ,
DOI : 10.1016/j.cose.2012.02.009
The hunt for Red October, http://www.dailymail.co.uk/sciencetech/article- 2263322/Operation-Red-October-revealed-The-astonishing-hacker-attack-infiltrated-55- 000-high-level-government-computers ,
Cybersecurity for Critical Infrastructures: Attack and Defense Modeling, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol.40, issue.4, pp.853-865, 2010. ,
DOI : 10.1109/TSMCA.2010.2048028
Cyberthreats, Vulnerabilities, and Attacks of SCADA Networks ,
12 Steps toward Cyber Resilience, https://www.isc2.org/infosecurity- professional-insights.aspx. 27. Yaron, O.: Flame virus had massive impact on Iran ,
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework, 2010 Sixth International Conference on Information Assurance and Security, pp.21-27, 2010. ,
DOI : 10.1109/ISIAS.2010.5604182
A Taxonomy of Cyber Attacks on SCADA Systems, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, pp.380-388, 2011. ,
DOI : 10.1109/iThings/CPSCom.2011.34