F. Schuster and A. Paul, A distributed intrusion detection system for industrial automation networks, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012), 2012.
DOI : 10.1109/ETFA.2012.6489703

D. Hadziosmanovi´chadziosmanovi´c, D. Bolzoni, S. Etalle, and P. H. Hartel, Challenges and Opportunities in Securing Industrial Control Systems, Proc. of the IEEE Workshop on Complexity in Engineering, 2012.

R. R. Barbosa and A. Pras, Intrusion Detection in SCADA Networks, Mechanisms for Autonomous Management of Networks and Services, pp.163-166, 2010.
DOI : 10.1007/978-3-642-13986-4_23

URL : https://hal.archives-ouvertes.fr/hal-01056632

R. Hofstede and A. Pras, Real-Time and Resilient Intrusion Detection: A Flow-Based Approach, Dependable Networks and Services (AIMS 2012), pp.109-112, 2012.
DOI : 10.1007/978-3-642-30633-4_13

R. R. Barbosa, R. Sadre, and A. Pras, Difficulties in Modeling SCADA Traffic: A Comparative Analysis, Proc. of the 13th Intl. Conf. on Passive and Active Measurement, pp.126-135, 2012.
DOI : 10.1016/S1389-1286(02)00298-0

?. Akerberg, J. Björkman, and M. , Exploring Security in PROFINET IO, 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009.
DOI : 10.1109/COMPSAC.2009.61

Y. Liu, P. Ning, and M. K. Reiter, False Data Injection Attacks Against State Estimation in Electric Power Grids, Proc. of the 16th ACM Conf. on Computer and Communications Security, 2009.

W. Gao, T. Morris, B. Reaves, and D. Richey, On SCADA Control System Command and Response Injection and Intrusion Detection, Proc. of the Fifth eCrime Researchers Summit, pp.1-9, 2010.

N. Fovino, I. Carcano, A. Masera, M. Trombetta, and A. , An experimental investigation of malware attacks on SCADA systems, International Journal of Critical Infrastructure Protection, vol.2, issue.4, pp.139-145, 2009.
DOI : 10.1016/j.ijcip.2009.10.001

D. Jin, D. Nicol, and G. Yan, An Event Buffer Flooding Attack in DNP3 Controlled SCADA Systems, Proc. of the 2011 Winter Simulation Conf, 2011.

D. Hadziosmanovi´chadziosmanovi´c, L. Simionato, D. Bolzoni, E. Zambon, and S. Etalle, N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols, Proc. of the 15th Intl. Symposium on Research in Attacks, Intrusions and Defenses, pp.354-373, 2012.

P. Laskov, P. Düssel, C. Schäfer, and K. Rieck, Learning Intrusion Detection: Supervised or Unsupervised?, Image Analysis and Processing, 2005.
DOI : 10.1007/11553595_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.257

A. Carcano, I. N. Fovino, M. Masera, and A. Trombetta, State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept, Proc. of the Fourth Intl. Workshop on Critical Information Infrastructures Security, pp.138-150, 2009.
DOI : 10.1007/978-3-642-14379-3_12

A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino et al., A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems, IEEE Transactions on Industrial Informatics, vol.7, issue.2, pp.179-186, 2011.
DOI : 10.1109/TII.2010.2099234

J. Rrushi and K. D. Kang, Detecting Anomalies in Process Control Networks, Critical Infrastructure Protection III, IFIP Advances in Information and Communication Technology, 2009.
DOI : 10.1145/235025.235031

O. Linda, T. Vollmer, and M. Manic, Neural Network based Intrusion Detection System for critical infrastructures, 2009 International Joint Conference on Neural Networks, pp.1827-1834, 2009.
DOI : 10.1109/IJCNN.2009.5178592

URL : http://www.osti.gov/scitech/servlets/purl/968568

D. Yang, A. Usynin, and J. W. Hines, Anomaly-based Intrusion Detection for SCADA Systems, Proc of the Fifth Intl. Topical Meeting on Nuclear Plant Instrumentation , Control and Human Machine Interface Technologies, pp.12-16, 2006.

P. Neumann and A. Pöschmann, Ethernet-based Real-time Communications with PROFINET IO, Proc. of the Seventh WSEAS Intl. Conf. on Automatic Control , Modeling and Simulation, pp.54-61, 2005.

B. Schölkopf and A. J. Smola, Learning with Kernels: Support Vector Machines, Regularization , Optimization, and Beyond, 2001.

J. Dougherty, R. Kohavi, and M. Sahami, Supervised and Unsupervised Discretization of Continuous Features, Proc. of the Twelfth Intl. Conf. on Machine Learning, 1995.
DOI : 10.1016/B978-1-55860-377-6.50032-3

H. Liu, F. Hussain, C. L. Tan, and M. Dash, Discretization: An Enabling Technique, Data Mining and Knowledge Discovery, vol.6, issue.4, pp.393-423, 2002.
DOI : 10.1023/A:1016304305535

L. Peng, W. Qing, and G. Yujia, Study on Comparison of Discretization Methods, 2009 International Conference on Artificial Intelligence and Computational Intelligence, 2009.
DOI : 10.1109/AICI.2009.385

A. Paul, F. Schuster, and H. König, Towards the Protection of Industrial Control Systems ??? Conclusions of a Vulnerability Analysis of Profinet IO, Accepted for the 10th Conf. on Detection of Intrusions and Malware and Vulnerability Assessment, 2013.
DOI : 10.1007/978-3-642-39235-1_10