F. Aarts, B. Jonsson, and J. Uijen, Generating models of infinite-state communications protocols using regular inference with abstraction, Proceedings of the Twenty-Second IFIP WG 6.1 International Conference on Testing Software and Systems, pp.188-204, 2010.

V. Chandola, A. Banerjee, and V. Kumar, Anomaly Detection for Discrete Sequences: A Survey, IEEE Transactions on Knowledge and Data Engineering, vol.24, issue.5, pp.823-839, 2012.
DOI : 10.1109/TKDE.2010.235

N. Goldenberg and A. Wool, Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems, International Journal of Critical Infrastructure Protection, vol.6, issue.2, pp.63-75, 2013.
DOI : 10.1016/j.ijcip.2013.05.001

D. Hadziosmanovic, D. Bolzoni, S. Etalle, and P. Hartel, Challenges and opportunities in securing industrial control systems, 2012 Complexity in Engineering (COMPENG). Proceedings, 2012.
DOI : 10.1109/CompEng.2012.6242970

D. Hadziosmanovic, L. Simionato, D. Bolzoni, E. Zambon, and S. Etalle, N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols, Proceedings of the Fifteenth International Symposium on Research in Attacks, Intrusions and Defenses, pp.354-373, 2012.
DOI : 10.1007/978-3-642-33338-5_18

S. Hofmeyr, S. Forrest, and A. Somayaji, Intrusion detection using sequences of system calls, Journal of Computer Security, vol.6, issue.3, pp.151-180, 1998.
DOI : 10.3233/JCS-980109

T. Krueger, H. Gascon, N. Kramer, and K. Rieck, Learning stateful models for network honeypots, Proceedings of the 5th ACM workshop on Security and artificial intelligence, AISec '12, pp.37-48, 2012.
DOI : 10.1145/2381896.2381904

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.676.9389

T. Lane and C. Brodley, Sequence matching and learning in anomaly detection for computer security, Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, pp.43-49, 1997.

R. Langner, To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve, The Langner Group, 2013.

G. Mao, J. Zhang, and X. Wu, Intrusion detection based on the short sequence model, Proceedings of the Seventh World Congress on Intelligent Control and Automation, pp.1449-1454, 2008.

S. Mclaughlin and P. Mcdaniel, SABOT, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.439-449, 2012.
DOI : 10.1145/2382196.2382244

I. N. Fovino, A. Carcano, T. De-lacheze-murel, A. Trombetta, and M. Masera, Modbus/DNP3 State-Based Intrusion Detection System, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.729-736, 2010.
DOI : 10.1109/AINA.2010.86

URL : http://publications.jrc.ec.europa.eu/repository/handle/JRC56496

R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari et al., Specification-based anomaly detection, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.265-274, 2002.
DOI : 10.1145/586110.586146

K. Stouffer, J. Falco, and K. Scarfone, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, National Institute of Standards and Technology, 2011.

A. Swales, Open Modbus/TCP Specification, Release 1.0, Schneider Electric, 1999.

C. Warrender, S. Forrest, and B. Pearlmutter, Detecting intrusions using system calls: alternative data models, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.133-145, 1999.
DOI : 10.1109/SECPRI.1999.766910

URL : http://eprints.maynoothuniversity.ie/1418/1/DetectingIntrusions.pdf