I. Ahmed, S. Obermeier, M. Naedele, and G. Richard, SCADA Systems: Challenges for Forensic Investigators, Computer, vol.45, issue.12, pp.44-51, 2012.
DOI : 10.1109/MC.2012.325

Z. Basnight, J. Butts, and T. Dube, Analysis of programmable logic controller firmware for threat assessment and forensic investigation, Journal of Information Warfare, vol.12, issue.2, p.2013

P. Eden, A. Blyth, P. Burnap, Y. Cherdantseva, K. Jones et al., A Forensic Taxonomy of SCADA Systems and Approach to Incident Response, 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, pp.42-51, 2015.
DOI : 10.14236/ewic/ICS2015.5

T. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa, and S. Shenoi, An Architecture for SCADA Network Forensics, Advances in Digital Forensics II, pp.273-285, 2006.
DOI : 10.1007/0-387-36891-4_22

H. Patzlaff, D7.1 Preliminary Report on Forensic Analysis for Industrial Systems, CRISALIS Consortium, 2013.

T. Spyridopoulos, T. Tryfonas, and J. May, Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems, 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013, 2013.
DOI : 10.1049/cp.2013.1720

P. Taveras, SCADA live forensics: Real time data acquisition process to detect, prevent or evaluate critical situations, Proceedings of the First Annual International Interdisciplinary Conference, pp.253-262, 2013.

T. Wu, J. Pagna-disso, K. Jones, and A. Campos, Towards a SCADA forensics architecture, Proceedings of the First International Symposium on ICS and SCADA Cyber Security Research, pp.12-21, 2013.

K. Zetter, Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon