1. (2018) Symantec security response. after triton, will the industrial threat landscape ever be the same?
2. (2024) Scada system (https://www.electronicshub.org/scada-system)
3. Abrams M, Weiss J (2008) Malicious control system cyber security attack case study-maroochy water services, australia. Tech. rep, MITRE CORP MCLEAN VA MCLEAN
4. Adepu S, Mathur A (2018) Assessing the effectiveness of attack detection at a hackfest on industrial control systems. IEEE Trans Sustain Comput 6:231–244. https://doi.org/10.1109/tsusc.2018.2878597
5. Aguayo Gonzalez C, Hinton A (2014) Detecting malicious software execution in programmable logic controllers using power fingerprinting. In: Butts J, Shenoi S (eds) Crit Infrastruct Protect VIII. Springer, Berlin Heidelberg