, Armed Forces History Museum, World War II's U.S. Ghost Army, Largo, Florida (www.armedforcesmuseum.com/world-war-iis-us-ghost-ar my), 2014.
A tool for the generation of realistic network workload for emerging networking scenarios, Computer Networks, vol.56, issue.15, pp.3531-3547, 2012. ,
DOI : 10.1016/j.comnet.2012.02.019
D-ITG 2.8.1 Manual, Computer for Interaction and Communications (COMICS) Group, Department of Electrical Engineering and Information Technologies, p.2013 ,
IDFAQ: What is a Honeypot? SANS Institute, Bethesda, Mary- land (www.sans.org/security-resources, 2000. ,
Gartner says the worlds of IT and operational technology are converging, Press Release, 2011. ,
Practical Application Layer Emulation in Industrial Control System Honeypots, pp.83-98, 2016. ,
DOI : 10.1016/j.ijcip.2015.04.002
URL : https://hal.archives-ouvertes.fr/hal-01614865
Honeypots: The sweet spot in network security, Computerworld, 2003. ,
, Control Systems Cyber Security: Defense in Depth Strategies, 2006.
IxLoad Application Replay, Data Sheet, Document No. 915-1744-01 Rev D, 2013. ,
IxLoad Overview ? Converged Multiplay Service Validation, Data Sheet, Document No. 915-1710-01-2161 Rev S, 2016. ,
Honeypots, Proceedings of the 45th annual southeast regional conference on , ACM-SE 45, pp.321-326, 2007. ,
DOI : 10.1145/1233341.1233399
, Test Traffic Solution, p.2014
Stateful Traffic Mix Tester Solutions, p.2015 ,
, NetLoad Product Series (Revision, vol.8, issue.9, p.2016
Ostinato User Guide (www.gitbook.com, p.2016 ,
A virtual honeypot framework, Proceedings of the Thirteenth USENIX Security Symposium, 2004. ,
Cybersecurity for SCADA Systems, PennWell Corporation, 2006. ,
Technical Specification Sheet (Revision 1), Document No. 149-967, 2003. ,
, APOGEE Brochure (Revision, vol.8, 2011.
, , pp.611-056, 2012.
Catching Flies: A Guide to the Various Flavors of Honeypots, 2016. ,
Network Traffic Generator with Engineer's Toolset, p.2016 ,
Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800- 82, National Institute of Standards and Technology, issue.2, 2015. ,
DOI : 10.6028/nist.sp.800-82r2
Automatic Configuration of Programmable Logic Controller Emulators, 2015. ,
The SCADA That Didn't Cry Wolf ? Who's Really Attacking Your ICS Equipment, Research Paper, Trend Micro, 2013. ,
Constructing cost-effective and targetable industrial control system honeypots for production networks, International Journal of Critical Infrastructure Protection, vol.10, pp.47-58, 2015. ,
DOI : 10.1016/j.ijcip.2015.04.002