SCADA systems: Challenges for forensic investigators, IEEE Computer, vol.45, issue.12, pp.44-51, 2012. ,
DOI : 10.1109/mc.2012.325
A Survey of Wireless Communications for the Electric Power System, 2010. ,
Exploiting Siemens Simatic S7 PLCs, presented at Black Hat USA, 2011. ,
Forensic analysis of a Siemens programmable logic controller, pp.117-130, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01614856
, W32.Stuxnet Dossier, Version 1.4, Symantec, 2011.
Forensic Analysis of Industrial Control Systems, 2015. ,
A review of SCADA anomaly detection systems, Proceedings of the Sixth International Conference on Soft Computing Models in Industrial and Environmental Applications, pp.357-366, 2011. ,
A log mining approach for process monitoring in SCADA, International Journal of Information Security, vol.11, issue.4, pp.231-251, 2012. ,
, New PLC worm virus and its countermeasures, 2016.
, , 2014.
STEP 7 Programming Made Easy in LAD, FBD and STL: A Practical Guide to Programming S7300/S7-400 Programmable Logic Controllers, 2013. ,
Stuxnet worm impact on industrial cyber-physical system security, Proceedings of the Thirty-Seventh Annual Conference of the IEEE Industrial Electronics Society, pp.4490-4494, 2011. ,
DOI : 10.1109/iecon.2011.6120048
Internet-facing PLCs as a network backdoor, Proceedings of the IEEE Conference on Communications and Network Security, pp.524-532, 2015. ,
DOI : 10.1109/cns.2015.7346865
, A time bomb with fourteen bytes, 2011.
Applicationlevel autonomic hardware to predict and preempt software attacks on industrial control systems, Proceedings of the Forty-Fourth Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.136-147, 2014. ,
DOI : 10.1109/dsn.2014.26
, Yuen Long Sewage Treatment Works System, 2008.
, , 2018.
Totally Integrated Automation Portal, 2018. ,
PLC-blaster: A worm living solely in the PLC, presented at Black Hat USA, 2016. ,
Incident analysis and digital forensics of SCADA and industrial control systems, Proceedings of the Eighth IET International System Safety Conference Incorporating the Cyber Security Conference, 2013. ,
DOI : 10.1049/cp.2013.1720
URL : https://research-information.bristol.ac.uk/files/20874699/06725809.pdf
Forensics in industrial control systems: A case study, Proceedings of the Workshop on the Security of Cyber-Physical Systems; Conference on Cybersecurity of Industrial Control Systems, pp.147-156, 2016. ,
Exploring the use of PLC debugging tools for digital forensic investigations of SCADA systems, Journal of Digital Forensics, Security and Law, vol.10, issue.4, pp.79-96, 2015. ,
PLC forensics based on control program logic change detection, Journal of Digital Forensics, Security and Law, vol.10, issue.4, pp.59-68, 2015. ,
Detecting anomalous programmable logic controller events using machine learning, Advances in Digital Forensics XIII, pp.81-94, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01716409