S. Abe, M. Fujimoto, S. Horata, Y. Uchida, and T. Mitsunaga, Security threats of Internet-reachable ICSs, Proceedings of the Fifty-Fifth Annual Conference of the Society of Instrument and Control Engineers of Japan, pp.750-755, 2016.
DOI : 10.1109/sice.2016.7749239

D. Beresford, Exploiting Siemens Simatic S7 PLCs, presented at Black Hat USA, 2011.

A. Cardenas, T. Roosta, and S. Sastry, Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems, Ad Hoc Networks, vol.7, issue.8, pp.1434-1447, 2009.
DOI : 10.1016/j.adhoc.2009.04.012

F. Cohen, A reference architecture approach to ICS security, 2011 4th International Symposium on Resilient Control Systems, pp.21-25, 2011.
DOI : 10.1109/ISRCS.2011.6016082

B. Ghena, W. Beyer, A. Hillaker, J. Pevarnek, and J. Haldeman, Green lights forever: Analyzing the security of traffic infrastructure, Proceedings of the Eighth USENIX Workshop on Offensive Technologies, 2014.

D. Hadziosmanovic, D. Bolzoni, S. Etalle, and P. Hartel, Challenges and opportunities in securing industrial control systems, 2012 Complexity in Engineering (COMPENG). Proceedings, 2012.
DOI : 10.1109/CompEng.2012.6242970

URL : http://eprints.eemcs.utwente.nl/22136/01/Compeng2012.pdf

P. Jie and L. Li, Industrial control system security, Proceedings of the International Conference on Intelligent Human-Machine Systems and Cybernetics, pp.156-158, 2011.
DOI : 10.1109/ihmsc.2011.108

E. Korkmaz, A. Dolgikh, M. Davis, and V. Skormin, ICS security testbed with delay attack case study, MILCOM 2016, 2016 IEEE Military Communications Conference, pp.283-288, 2016.
DOI : 10.1109/MILCOM.2016.7795340

M. Krotofil and D. Gollmann, Industrial control systems security: What is happening?, Proceedings of the Eleventh IEEE International Conference on Industrial Informatics, pp.670-675, 2013.
DOI : 10.1109/indin.2013.6622963

J. Malchow, D. Marzin, J. Klick, R. Kovacs, V. Roth et al., A practical defense against attacks on cyber-physical systems, Proceedings of the IEEE Conference on Communications and Network Security, pp.326-334, 2015.
DOI : 10.1109/cns.2015.7346843

S. Mclaughlin and S. Zonouz, Controller-aware false data injection against programmable logic controllers, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.848-853, 2014.
DOI : 10.1109/SmartGridComm.2014.7007754

T. Miyachi and T. Yamada, Current issues and challenges on cyber security for industrial automation and control systems, 2014 Proceedings of the SICE Annual Conference (SICE), pp.821-826, 2014.
DOI : 10.1109/SICE.2014.6935227

Y. Mo and B. Sinopoli, False data injection attacks in control systems, presented at the First Workshop on Secure Control Systems, 2010.

R. Piggin, Emerging good practice for cyber security of industrial control systems and SCADA, 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012, 2012.
DOI : 10.1049/cp.2012.1522

T. Spyridopoulos, T. Tryfonas, and J. May, Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems, 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013, 2013.
DOI : 10.1049/cp.2013.1720

A. Timorin, SCADA deep inside: Protocols and security mechanisms, presented at the Balkan Computer Congress, 2014.

D. Wei and K. Ji, Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights, 2010 3rd International Symposium on Resilient Control Systems, pp.15-22, 2010.
DOI : 10.1109/ISRCS.2010.5603480