D. Berman and J. Butts, Towards characterization of cyber attacks on industrial control systems: Emulating field devices using Gumstix technology, 2012 5th International Symposium on Resilient Control Systems, pp.63-68, 2012.
DOI : 10.1109/ISRCS.2012.6309294

C. Davis, J. Tate, H. Okhravi, C. Grier, T. Overbye et al., SCADA Cyber Security Testbed Development, 2006 38th North American Power Symposium, pp.483-488, 2006.
DOI : 10.1109/NAPS.2006.359615

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.1936

D. Duggan, Penetration Testing of Industrial Control Systems, Sandia Report SAND2005-2846P, Sandia National Laboratories, 2005.

K. Gatens, INEEL establishes National SCADA Test Bed, Feature Story, Idaho National Laboratory, Idaho Falls, Idaho (www.inl.gov, 2003.

N. Kisserli, D. Schellekens, and B. Preneel, Self-encrypting code to protect against analysis and tampering, Proceedings of the First Benelux Workshop on Information and System Security, 2006.

G. Lyon, Nmap Network Scanning, The Official Nmap Project Guide to Network Discovery and Security Scanning, Insecure.com, 2008.

S. Mcclure, J. Scambray, and G. Kurtz, Hacking Exposed 7: Network Security Secrets and Solutions, 2012.

T. Morris, R. Vaughn, and Y. Dandass, A testbed for SCADA control system cyber security research and pedagogy, Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011.

D. Peck and D. Peterson, Leveraging Ethernet card vulnerabilities in field devices, Proceedings of the SCADA Security Scientific Symposium, 2009.

C. Queiroz, A. Mahmood, J. Hu, Z. Tari, and X. Yu, Building a SCADA Security Testbed, 2009 Third International Conference on Network and System Security, pp.357-364, 2009.
DOI : 10.1109/NSS.2009.82

R. Wightman and K. , Automation direct vulnerabilities, Digital Bond, p.2012, 2012.