1. Almalawi, A., Fahad, A., Tari, Z., Alamri, A., AlGhamdi, R., Zomaya, A.Y.: An efficient data-driven clustering technique to detect attacks in scada systems. IEEE Trans. Inf. Forensics Secur. 11(5), 893–906 (2016)
2. Bencsáth, B., Pék, G., Buttyán, L., Felegyhazi, M.: skywiper (aka flame aka flamer): A complex malware for targeted attacks. CrySyS Lab Technical report, No. CTR-2012-05-31 (2012)
3. Bonvini, M., Leva, A.: A modelica library for industrial control systems. In: Proceedings of the 9th International MODELICA Conference; 3–5 September 2012, Munich, Germany, pp. 477–484. No. 076, Linköping University Electronic Press (2012)
4. Boterenbrood, H.: Canopen High-Level Protocol for Can-Bus. Nikhef, Amsterdam (2000)
5. Brunner, M., Hofinger, H., Krauß, C., Roblee, C., Schoo, P., Todt, S.: Infiltrating Critical Infrastructures with Next-generation Attacks. Fraunhofer Institute for Secure Information Technology (SIT), Munich (2010)