An autonomous control system for boiler-turbine units, IEEE Transactions on Energy Conversion, vol.11, issue.2, pp.401-406, 1996. ,
DOI : 10.1109/60.507652
Dynamic Models for Boiler-Turbine Alternator Units: Data Logs and Parameter Estimation for a 160 MW Unit, 1987. ,
An introduction to the high level architecture (HLA) runtime infrastructure (RTI), Proceedings of the Fourteenth Workshop on Standards for the Interoperability of Defense Simulations, pp.705-715, 1996. ,
Simulation of network attacks on SCADA systems, presented at the First Workshop on Secure Control Systems, 2010. ,
Identification of boiler models, IEE Proceedings D Control Theory and Applications, vol.136, issue.5, pp.261-271, 1989. ,
DOI : 10.1049/ip-d.1989.0035
SCADA Cyber Security Testbed Development, 2006 38th North American Power Symposium, pp.483-488, 2006. ,
DOI : 10.1109/NAPS.2006.359615
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.1936
A Taxonomy of Attacks on the DNP3 Protocol, pp.67-81, 2009. ,
DOI : 10.1016/j.ijcip.2008.08.003
Stuxnet Dossier, Symantec, Mountain View, California (www.symantec.com/content, 2011. ,
A Preliminary Study of a Wireless Process Control Network Using Emulation Testbeds, Proceedings of the Second International Conference on Mobile Lightweight Wireless Systems, pp.268-279, 2010. ,
DOI : 10.1109/RTAS.2008.15
Development of real time power system simulator in Matlab/Simulink environment, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134), pp.2096-2100, 2000. ,
DOI : 10.1109/PESS.2000.866970
An experimental investigation of direct condensation of steam jet in subcooled water, Journal of the Korean Nuclear Society, vol.29, issue.1, pp.45-57, 1997. ,
Modeling and control of a micro-turbine-based distributed generation system, International Journal of Circuits Systems and Signal Processing, vol.3, issue.2, pp.65-72, 2009. ,
Design and analysis of boiler-turbine-generator controls using optimal linear regulator theory, IEEE Transactions on Automatic Control, vol.18, issue.3, pp.202-209, 1973. ,
DOI : 10.1109/TAC.1973.1100308
An experimental investigation of malware attacks on SCADA systems, International Journal of Critical Infrastructure Protection, vol.2, issue.4, pp.139-145, 2009. ,
DOI : 10.1016/j.ijcip.2009.10.001
An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants, 3rd International Conference on Human System Interaction, pp.679-686, 2010. ,
DOI : 10.1109/HSI.2010.5514494
Model-based integration and experimentation of information fusion and C2 systems, Proceedings of the Twelfth International Conference on Information Fusion, pp.1958-1965, 2009. ,
Building a SCADA Security Testbed, 2009 Third International Conference on Network and System Security, pp.357-364, 2009. ,
DOI : 10.1109/NSS.2009.82
An intelligent tutoring system for a power plant simulator, Electric Power Systems Research, pp.161-171, 2002. ,
DOI : 10.1016/S0378-7796(02)00047-0
Analysis and control of a nonlinear boiler-turbine unit, Journal of Process Control, vol.15, issue.8, pp.883-891, 2005. ,
DOI : 10.1016/j.jprocont.2005.03.007
A Simulation Environment for SCADA Security Analysis and Assessment, 2010 International Conference on Measuring Technology and Mechatronics Automation, pp.342-347, 2010. ,
DOI : 10.1109/ICMTMA.2010.603
An integrated experimental environment for distributed systems and networks, Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, pp.255-270, 2002. ,