An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications, 2013 12th International Conference on Machine Learning and Applications, pp.54-59, 2013. ,
DOI : 10.1109/ICMLA.2013.105
A cyber-physical experimentation environment for the security analysis of networked industrial control systems, Computers & Electrical Engineering, vol.38, issue.5, pp.1146-1161, 2012. ,
DOI : 10.1016/j.compeleceng.2012.06.015
Vertebrate flight, University of California Museum of Paleontology, 1996. ,
An integrated framework for control system simulation and regulatory compliance monitoring, International Journal of Critical Infrastructure Protection, vol.4, issue.1, pp.41-53, 2011. ,
DOI : 10.1016/j.ijcip.2011.03.002
Vulnerability Analysis Case Studies of Control System Human-Machine Interfaces, 2012. ,
A testbed for SCADA control system cybersecurity research and pedagogy, Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '11, 2011. ,
DOI : 10.1145/2179298.2179327
Executive Order 13636: Improving Critical Infrastructure Cybersecurity , The White House ,
An open virtual testbed for industrial control system security research, International Journal of Information Security, vol.I, issue.4, pp.215-229, 2012. ,
DOI : 10.1007/s10207-012-0164-7