Usage of rules at Site C with varying times and rule IDs References A first look into SCADA network traffic, INFRASTRUCTURE PROTECTION IX Figure 11 Proceedings of the IEEE Network Operations and Management Symposium, pp.518-521, 2012. ,
Flow whitelisting in SCADA networks, International Journal of Critical Infrastructure Protection, vol.6, issue.3-4, pp.150-158, 2013. ,
DOI : 10.1016/j.ijcip.2013.08.003
Centrality in social networks conceptual clarification, Social Networks, vol.1, issue.3, pp.215-239 ,
DOI : 10.1016/0378-8733(78)90021-7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.227.9549
Whitelisting for critical ITbased infrastructure, IEICE Transactions on Communications, vol.96, issue.4, pp.1070-1074, 2013. ,
Whitelist generation technique for industrial firewalls in SCADA networks, in Frontier and Innovation in Future Computing and Communications, pp.525-534, 2014. ,
Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware, 2014. ,
Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, National Institute of Standards and Technology, 2011. ,
Burst-based anomaly detection on the DNP3 protocol, International Journal of Control and Automation, vol.6, issue.2, pp.313-324, 2013. ,