1. Amin, S., Litrico, X., Sastry, S., and Bayen, A. (2012a). Cyber security of water scada systems:(i) analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 20.
2. Amin, S., Litrico, X., Sastry, S., and Bayen, A. (2012b). Cyber security of water scada systems:(ii) attack detection using an enhanced hydrodynamic model. IEEE Transactions on Control Systems Technology, 20.
3. Detection of abrupt changes: theory and application;Basseville,1993
4. Brunner, M., Hofinger, H., Krauss, C., Roblee, C., Schoo, P., and Todt, S. (2010). Infiltrating critical infrastructures with next-generation attacks. Fraunhofer Institute for Secure Information Technology (SIT), Munich.
5. Attacks against process control systems: risk assessment, detection, and response;Cárdenas;Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security,2011