]. R. Barbosa, R. Sadre, and A. Pras, Usage of rules at Site C with varying times and rule IDs References A first look into SCADA network traffic, INFRASTRUCTURE PROTECTION IX Figure 11 Proceedings of the IEEE Network Operations and Management Symposium, pp.518-521, 2012.

R. Barbosa, R. Sadre, and A. Pras, Flow whitelisting in SCADA networks, International Journal of Critical Infrastructure Protection, vol.6, issue.3-4, pp.150-158, 2013.
DOI : 10.1016/j.ijcip.2013.08.003

L. Freeman, Centrality in social networks conceptual clarification, Social Networks, vol.1, issue.3, pp.215-239
DOI : 10.1016/0378-8733(78)90021-7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. Jang, I. Shin, B. Min, J. Seo, and M. Yoon, Whitelisting for critical ITbased infrastructure, IEICE Transactions on Communications, vol.96, issue.4, pp.1070-1074, 2013.

D. Kang, B. Kim, J. Na, and K. Jhang, Whitelist generation technique for industrial firewalls in SCADA networks, in Frontier and Innovation in Future Computing and Communications, pp.525-534, 2014.

A. Sood and R. Enbody, Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware, 2014.

K. Stouffer, J. Falco, and K. Scarfone, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, National Institute of Standards and Technology, 2011.

J. Yun, S. Jeon, K. Kim, and W. Kim, Burst-based anomaly detection on the DNP3 protocol, International Journal of Control and Automation, vol.6, issue.2, pp.313-324, 2013.