A distributed intrusion detection system for industrial automation networks, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012), 2012. ,
DOI : 10.1109/ETFA.2012.6489703
Challenges and Opportunities in Securing Industrial Control Systems, Proc. of the IEEE Workshop on Complexity in Engineering, 2012. ,
Intrusion Detection in SCADA Networks, Mechanisms for Autonomous Management of Networks and Services, pp.163-166, 2010. ,
DOI : 10.1007/978-3-642-13986-4_23
URL : https://hal.archives-ouvertes.fr/hal-01056632
Real-Time and Resilient Intrusion Detection: A Flow-Based Approach, Dependable Networks and Services (AIMS 2012), pp.109-112, 2012. ,
DOI : 10.1007/978-3-642-30633-4_13
Difficulties in Modeling SCADA Traffic: A Comparative Analysis, Proc. of the 13th Intl. Conf. on Passive and Active Measurement, pp.126-135, 2012. ,
DOI : 10.1016/S1389-1286(02)00298-0
Exploring Security in PROFINET IO, 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009. ,
DOI : 10.1109/COMPSAC.2009.61
False Data Injection Attacks Against State Estimation in Electric Power Grids, Proc. of the 16th ACM Conf. on Computer and Communications Security, 2009. ,
On SCADA Control System Command and Response Injection and Intrusion Detection, Proc. of the Fifth eCrime Researchers Summit, pp.1-9, 2010. ,
An experimental investigation of malware attacks on SCADA systems, International Journal of Critical Infrastructure Protection, vol.2, issue.4, pp.139-145, 2009. ,
DOI : 10.1016/j.ijcip.2009.10.001
An Event Buffer Flooding Attack in DNP3 Controlled SCADA Systems, Proc. of the 2011 Winter Simulation Conf, 2011. ,
N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols, Proc. of the 15th Intl. Symposium on Research in Attacks, Intrusions and Defenses, pp.354-373, 2012. ,
Learning Intrusion Detection: Supervised or Unsupervised?, Image Analysis and Processing, 2005. ,
DOI : 10.1007/11553595_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.257
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept, Proc. of the Fourth Intl. Workshop on Critical Information Infrastructures Security, pp.138-150, 2009. ,
DOI : 10.1007/978-3-642-14379-3_12
A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems, IEEE Transactions on Industrial Informatics, vol.7, issue.2, pp.179-186, 2011. ,
DOI : 10.1109/TII.2010.2099234
Detecting Anomalies in Process Control Networks, Critical Infrastructure Protection III, IFIP Advances in Information and Communication Technology, 2009. ,
DOI : 10.1145/235025.235031
Neural Network based Intrusion Detection System for critical infrastructures, 2009 International Joint Conference on Neural Networks, pp.1827-1834, 2009. ,
DOI : 10.1109/IJCNN.2009.5178592
URL : http://www.osti.gov/scitech/servlets/purl/968568
Anomaly-based Intrusion Detection for SCADA Systems, Proc of the Fifth Intl. Topical Meeting on Nuclear Plant Instrumentation , Control and Human Machine Interface Technologies, pp.12-16, 2006. ,
Ethernet-based Real-time Communications with PROFINET IO, Proc. of the Seventh WSEAS Intl. Conf. on Automatic Control , Modeling and Simulation, pp.54-61, 2005. ,
Learning with Kernels: Support Vector Machines, Regularization , Optimization, and Beyond, 2001. ,
Supervised and Unsupervised Discretization of Continuous Features, Proc. of the Twelfth Intl. Conf. on Machine Learning, 1995. ,
DOI : 10.1016/B978-1-55860-377-6.50032-3
Discretization: An Enabling Technique, Data Mining and Knowledge Discovery, vol.6, issue.4, pp.393-423, 2002. ,
DOI : 10.1023/A:1016304305535
Study on Comparison of Discretization Methods, 2009 International Conference on Artificial Intelligence and Computational Intelligence, 2009. ,
DOI : 10.1109/AICI.2009.385
Towards the Protection of Industrial Control Systems ??? Conclusions of a Vulnerability Analysis of Profinet IO, Accepted for the 10th Conf. on Detection of Intrusions and Malware and Vulnerability Assessment, 2013. ,
DOI : 10.1007/978-3-642-39235-1_10