D. Buza, F. Juhasz, G. Miru, M. Felegyhazi, and T. Holczer, CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot, pp.181-192, 2014.
DOI : 10.1007/978-3-319-10329-7_12

Y. Huang, A. Cardenas, S. Amin, Z. Lin, H. Tsai et al., Understanding the physical and economic consequences of attacks on control systems, International Journal of Critical Infrastructure Protection, vol.2, issue.3, pp.73-83, 2009.
DOI : 10.1016/j.ijcip.2009.06.001

R. Jaromin, Emulation of Industrial Control Field Device Protocols, 2013.

C. Leita, K. Mermoud, and M. Dacier, ScriptGen: an automated script generation tool for honeyd, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.203-214, 2005.
DOI : 10.1109/CSAC.2005.49

N. Provos, A virtual honeypot framework, Proceedings of the Thirteenth USENIX Security Symposium, 2004.

N. Provos and T. Holz, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, 2007.

P. Warner, Automatic Configuration of Programmable Logic Controller Emulators, 2015.

M. Winn, Constructing Cost-Effective and Targetable ICS Honeypots Suited for Production Networks, 2015.

M. Winn, M. Rice, S. Dunlap, J. Lopez, and B. Mullins, Constructing cost-effective and targetable industrial control system honeypots for production networks, International Journal of Critical Infrastructure Protection, vol.10, pp.47-58, 2015.
DOI : 10.1016/j.ijcip.2015.04.002