A. Bruce, Reliability analysis of electric utility SCADA systems, IEEE Transactions on Power Systems, vol.13, issue.3, pp.844-849, 1998.
DOI : 10.1109/59.708711

J. Buford, X. Wu, and V. Krishnaswamy, Spatial-Temporal Event Correlation, 2009 IEEE International Conference on Communications, 2009.
DOI : 10.1109/ICC.2009.5199474

G. Buttazzo, G. Lipari, L. Abeni, and M. Caccamo, Soft Real-Time Systems: Predictability vs, Efficiency, 2005.

J. Cannady and J. Harrell, A comparative analysis of current intrusion detection technologies, Proceedings of the Technology in Information Security Conference, pp.212-218, 1996.

K. Erickson, E. Stanek, E. Cetinkaya, S. Dunn-norman, and A. Miller, Reliability of SCADA systems in offshore oil and gas platforms, in Stability and Control of Dynamical Systems with Applications: A Tribute to, pp.395-404, 2003.

G. Jiang and G. Cybenko, Temporal and spatial distributed event correlation for network security, Proceedings of the American Control Conference, pp.996-1001, 2004.

R. Kalapatapu, SCADA protocols and communication trends, presented at the Instrumentation, Systems and Automation Society Conference, 2004.

. Logmatrix, NerveCenter 6.0 Release Notes Windows and UNIX Version 6, 2012.

R. Mcmillan, Siemens: Stuxnet worm hit industrial systems, Computerworld, 2010.

I. N. Fovino, M. Masera, M. Guglielmi, A. Carcano, and A. Trombetta, Distributed Intrusion Detection System for SCADA Protocols, Critical Infrastructure Protection IV, pp.95-110, 2010.
DOI : 10.1007/978-3-642-16806-2_7

A. Patcha and J. Park, An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer Networks, vol.51, issue.12, pp.3448-3470, 2007.
DOI : 10.1016/j.comnet.2007.02.001

K. Sheers, HP OpenView event correlation services, HP Journal Online, issue.4, 1996.

S. Controls, Reliability and Availability of SCADA Systems, Shanghai , China (www.star-controls.com/Files/ReliabilityandAvailabil ityofSCADASystems, 2010.

K. Stouffer, J. Falco, and K. Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, NIST Special Publication 800-82, National Institute of Standards and Technology, 2006.

J. Weiss, Protecting Industrial Control Systems from Electronic Threats, 2010.

D. Williams and D. Curtis, Magic Quadrant for IT Event Correlation and Analysis, Gartner RAS Core Research Note G00208774, 2010.

B. Zhu and S. Sastry, SCADA-specific intrusion detection/prevention systems: A survey and taxonomy, Proceedings of the First Workshop on Secure Control Systems, 2010.