1. Using process invariants to detect cyber attacks on a water treatment system;Adepu,2016
2. Truth will out: departure-based process-level detection of stealthy attacks on control systems;Aoudi,2018
3. Flow whitelisting in SCADA networks;Barbosa;Int. J. Crit. Infrastruct. Prot.,2013
4. Difficulties in modeling SCADA traffic: a comparative analysis;Barbosa,2012
5. Detection, correlation, and visualization of attacks against critical infrastructure systems;Briesemeister,2010