Protecting industrial control systems from electronic threats, 2010. ,
Securing Control Systems from the Inside: A Case for Mediating Physical Behaviors, IEEE Security & Privacy, vol.11, issue.4, pp.82-84, 2013. ,
DOI : 10.1109/MSP.2013.96
Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011. ,
DOI : 10.1109/MSP.2011.67
A survey SCADA of and critical infrastructure incidents, Proceedings of the 1st Annual conference on Research in information technology, RIIT '12, pp.51-56, 2012. ,
DOI : 10.1145/2380790.2380805
Electric Grid Vul- nerability: Industry Responses Reveal Security Gaps, 2013. ,
Design and Implementation of a Secure Modbus Protocol, Critical Infrastructure Protection III, ser. IFIP Advances in Information and Communication Technology, 2009. ,
DOI : 10.1145/359340.359342
Sp 800-82. guide to industrial control systems (ics) security: Supervisory control and data acquisition (scada) systems, distributed control systems (dcs), and other control system configurations such as programmable logic controllers (plc), 2011. ,
Zmap: Fast internetwide scanning and its security applications, USENIX Security Symposium ,
MASSCAN: Mass IP port scanner, accessed on 07, 2016. ,
A review of port scanning techniques, ACM SIGCOMM Computer Communication Review, vol.29, issue.2, pp.41-48, 1999. ,
DOI : 10.1145/505733.505737
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Insecure, 2009. ,
ScanSSH -Scanning the Internet for SSH Servers, Proceedings of The 15th USENIX Systems Administration Conference, pp.25-30, 2001. ,
An Observatory for the SSLiverse, 2010. ,
Demystifying Internet-Wide Service Discovery, IEEE/ACM Transactions on Networking, vol.21, issue.6, pp.1760-1773, 2013. ,
DOI : 10.1109/TNET.2012.2231434
Analysis of a "/0" stealth scan from a botnet, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, pp.341-354, 2015. ,
DOI : 10.1145/2398776.2398778
A survey of intrusion detection techniques for cyber-physical systems, ACM Computing Surveys, vol.46, issue.4, pp.1-5529, 2014. ,
DOI : 10.1145/2542049
Towards Learning Normality for Anomaly Detection in Industrial Control Networks, Conference on Autonomous Infrastructure, Management, and Security (AIMS, 2013. ,
DOI : 10.1007/978-3-642-38998-6_8
URL : https://hal.archives-ouvertes.fr/hal-01489971
Semantic security analysis of scada networks to detect malicious control commands in power grids, Smart Energy Grid Security (SEGS), ser. SEGS. ACM, 2013. ,
Development of the PowerCyber SCADA security testbed, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '10, 2010. ,
DOI : 10.1145/1852666.1852690
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept, Critical Information Infrastructures Security, ser. Lecture Notes in Computer Science, 2010. ,
DOI : 10.1007/978-3-642-14379-3_12
Quantitatively assessing and visualising industrial system attack surfaces, 2011. ,
A Search Engine Backed by Internet-Wide Scanning, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015. ,
DOI : 10.1145/2810103.2813703