1. Alsumayt, A., Haggerty, J.: Using trust based method to detect DoS attack in MANETs. The Convergence of Networking, Broadcasting, and Telecommunications, UK, PGNet (2014)
2. Anderson, D., Kipp, N.: Implementing firewalls for modern substation cybersecurity. In: Proceedings of the 12th Annual Western Power Delivery Automation Conference, Spokane, WA (2010)
3. Ceron, J., Chromik, J., Cardoso de Santanna, J., Pras, A.: Online discoverability and vulnerabilities of ICS/SCADA devices in the Netherlands. University of Twente, Netherlands (2019). In opdracht van het Wetenschappelijk Onderzoek en Documentatiecentrum (WODC)
4. Chalamasetty, G.K., Mandal, P., Tseng, T.L.: Secure SCADA communication network for detecting and preventing cyber-attacks on power systems. In: 2016 Clemson University Power Systems Conference (PSC), pp. 1–7. IEEE (2016)
5. Coffey, K., Smith, R., Maglaras, L., Janicke, H.: Vulnerability analysis of network scanning on SCADA systems. Secur. Commun. Netw. (2018)