Research trend on secure SCADA network technology and methods, WSEAS Transactions on Systems and Control, vol.8, issue.5, pp.635-645, 2010. ,
Secure SCADA network technology and methods, Proceedings of the Twelfth WSEAS International Conference on Automatic Control, Modeling and Simulation, pp.434-438, 2010. ,
Introduction to Stochastic Petri Nets, Lectures on Formal Methods and Performance Analysis, pp.84-155, 2001. ,
DOI : 10.1007/3-540-44667-2_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.1476
Security and auditing of VPN, Proceedings of Third International Workshop on Services in Distributed and Networked Environments, pp.132-138, 1996. ,
DOI : 10.1109/SDNE.1996.502456
Keying Hash Functions for Message Authentication, Proceedings of the Sixteenth International Cryptology Conference, pp.1-15, 1996. ,
DOI : 10.1007/3-540-68697-5_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.8430
Stuxnet worm causes industry concern for security firmsStuxnet-worm-causes-industry-concern-for-security- firms.html), 2010. ,
The Mobius framework and its implementation, IEEE Transactions on Software Engineering, vol.28, issue.10, pp.956-969, 2002. ,
DOI : 10.1109/TSE.2002.1041052
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.2897
How to reduce malware-induced security breaches, eWeek .com, 2010. ,
A survey on communication networks for electric system automation, Computer Networks, vol.50, issue.7, pp.877-897, 2006. ,
DOI : 10.1016/j.comnet.2006.01.005
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.277
Modeling and Verification of IPSec and VPN Security Policies, 13TH IEEE International Conference on Network Protocols (ICNP'05), pp.259-278, 2005. ,
DOI : 10.1109/ICNP.2005.25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.8848
The Internet Key Exchange, RFC 2409, 1998. ,
DOI : 10.17487/rfc2409
United Kingdom (www.nta-monitor.com/posts, 2005. ,
Getting the real-time precise roundtrip time for stepping stone detection, Proceedings of the Fourth International Conference on Network and System Security, pp.377-382, 2010. ,
DOI : 10.1109/nss.2010.36
Modbus Application Protocol Specification V.1.1b, Hopkinton , Massachusetts (www.modbus.org/docs/Modbus Application Proto col V1 1b, 2006. ,
Different flavors of man-in-the-middle attack: Consequences and feasible solutions, Proceedings of the Third IEEE International Conference on Computer Science and Information Technology, pp.491-495, 2010. ,
Improving the cyber security of SCADA communication networks, Communications of the ACM, vol.52, issue.7, pp.139-142, 2009. ,
DOI : 10.1145/1538788.1538820
A cryptographic tour of the IPsec standards, Information Security Technical Report, vol.11, issue.2, pp.72-81, 2006. ,
DOI : 10.1016/j.istr.2006.03.004
Extended Authentication within ISAKMP, Internet Draft, 1999. ,
Stochastic activity networks: Formal definitions and concepts, in Lectures on Formal Methods and Performance Analysis, pp.315-343, 2001. ,
DOI : 10.1007/3-540-44667-2_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.5191
Analysis of communication alternatives in a heterogeneous network for a supervision and control system, Computer Communications, vol.29, issue.8, pp.1133-1145, 2006. ,
DOI : 10.1016/j.comcom.2005.07.001
Probabilistic validation of an intrusion-tolerant replication system, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., pp.615-624, 2003. ,
DOI : 10.1109/DSN.2003.1209971
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.1781
Security analysis of SITAR intrusion tolerance system, Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems in association with 10th ACM Conference on Computer and Communications Security, SSRS '03, pp.23-32, 2003. ,
DOI : 10.1145/1036921.1036924