1. Ahmed, I., Obermeier, S., Naedele, M., Richard, G.: SCADA systems: Challenges for forensic investigators, IEEE Computer, vol. 45(12), pp. 44–51 (2012)
2. Basnight, Z., Butts, J., Dube, T.: Analysis of programmable logic controller firmware for threat assessment and forensic investigation, Journal of Information Warfare, vol. 12(2) (2013)
3. Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H., Stoddart, K.: A forensic taxonomy of SCADA systems and approach to incident response, Proceedings of the Third International Symposium on ICS and SCADA Cyber Security Research, pp. 42–51 (2015)
4. Kilpatrick, T., Gonzalez, J., Chandia, R., Papa, M., Shenoi, S.: An architecture for SCADA network forensics, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 273–285 (2006)
5. Patzlaff, H.: D7.1 Preliminary Report on Forensic Analysis for Industrial Systems, CRISALIS Consortium, Symantec, Sophia Antipolis, France (2013)