References
- A. Ginter, "An analysis of Whitelisting security solutions and their applicability in control systems," in SCADA Security Sci. Symp. (S4) 2010, Miami, U.S.A., Jan. 2010.
- J. Yoon, W. Kim, and J. Seo, "Study on Technology Requirement using the Technological Trend of Security Products concerning Industrial Control System," J. Korea Inst. Inform. Security Crytology, vol. 22, no. 5, pp. 22-26, Aug. 2012.
- B. Zhu, A. Joseph, and S. Sastry, "A taxonomy of cyber attacks on SCADA systems," in Proc. IEEE Int. Conf. Internet Things (iThings/CPSCom), pp. 308-388, Dalian, China, Oct. 2011.
- I. N. Fovino, A. Coletta, and M. Masera, "Taxonomy of security solutions for the SCADA sector," ESCoRTS, Deliverable D22, Mar. 2010.
- D.-J. Kang, J.-J. Lee, S.-J. Kim, and J.-H. Park, "Analysis on cyber threats to SCADA systems," in Proc. IEEE Transmission Distribution Conf. Expo.: Asia Pacific, pp. 1-4, Seoul, Korea, Oct. 2009.
- M. Franz, "ICCP exposed: assessing the attack surface of the utility stack," in SCADA Security Sci. Symp. (S4), Miami, U.S.A., Jan. 2007.
- Y. J. Won, "Fault detection, diagnosis, and prediction for IP-based industrial control networks," Ph.D. dissertation, Dept. Elect. Comput. Eng., Postech, Korea, Nov. 2009.
- U.S. Homeland Security, "Common cybersecurity vulnerabilities in industrial control," Nat. Cyber Security Division, Control Syst. Security Program, May 2011.
- IEC, "IEC 62351 part1 : communication network and system security - introduction to security issues," IEC TS 62351-1, May 2007.
- Digital Bond, Quickdraw SCADA IDS, Retrieved June, 26, 2013, from http://www.digitalbond.com/tools/quickdraw/.
- M. Jang, G. Lee, S. Kim, B.-G. Min, W.-N. Kim, and J. Seo, "Testing vulnerabilities of DNP3," J. Security Eng., vol. 7, no. 1, Feb. 2010.
- X. Li, X. Liang, R. Lu, X. Shen, X. Lin, and H. Zhu, "Securing smart grid: cyber attacks," IEEE Commun. Mag., vol. 50, no. 8, pp. 38-45, Aug. 2012.