E. Byres and J. Lowe, The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems, Proceedings of the VDE Congress, 2004.

R. R. Barbosa and A. Pras, Intrusion Detection in SCADA Networks, Proceedings of conference on Autonomous Infrastructure, 2010.
DOI : 10.1007/978-3-642-13986-4_23

URL : https://hal.archives-ouvertes.fr/hal-01056632

R. R. Barbosa, R. Sadre, and A. Pras, Difficulties in Modeling SCADA Traffic: A Comparative Analysis, Proceedings of PAM Conference, 2012.
DOI : 10.1016/S1389-1286(02)00298-0

R. Krej?í, P. Celeda, and J. Dobrovoln´ydobrovoln´y, Traffic Measurement and Analysis of Building Automation and Control Networks, Proceedings of conference on Autonomous Infrastructure, 2012.
DOI : 10.1007/978-3-642-30633-4_9

D. G. Holmberg, J. Bender, and M. Galler, Using the BACnet Firewall Router

D. Yang, A. Usynin, and J. W. Hines, Anomaly-Based Intrusion Detection for SCADA Systems, Proc. of 5th Intl. Topical Meeting on Nuclear Plant Instrumentation , Control and Human Machine Interface Technologies, 2006.

D. G. Holmberg, BACnet wide area network security threat assessment, U.S. Dept. of Commerce, National Institute of Standards and Technology, 2003.
DOI : 10.6028/nist.ir.7009

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.2744

A. Ashrae, Addendum g to BACnet Standard 135, 2008.

A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras et al., An Overview of IP Flow-Based Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.12, issue.3, pp.343-356
DOI : 10.1109/SURV.2010.032210.00054

C. E. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.4, pp.623-656, 1948.
DOI : 10.1002/j.1538-7305.1948.tb00917.x

S. Whalen, An Introduction to ARP Spoofing, 2001.

P. Nikander, J. Kempf, E. P. Nordmark, R. Krej?í, and V. Krmí?ek, IPv6 Neighbor Discovery (ND) Trust Models and Threats Revealing and Analysing Modem Malware, IETF Proceedings of the IEEE International Conference on Communications, 2004.

F. Fazzi, Lightaidra ? IRC-based mass router scanner/exploiter, 109244.

A. Cui and S. Stolfo, A quantitative analysis of the insecurity of embedded network devices, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, 2010.
DOI : 10.1145/1920261.1920276

E. Byres, #1 ICS and SCADA Security Myth: Protection by Air Gap Tofino Security , http://www.tofinosecurity.com/blog/1-ics-and-scada-security-myth- protection-air-gap

R. Hofstede and T. Fioreze, SURFmap: A network monitoring tool based on the Google Maps API, 2009 IFIP/IEEE International Symposium on Integrated Network Management, 2009.
DOI : 10.1109/INM.2009.5188876