1. Abbasi, A., Hashemi, M., 2016. Ghost in the plc: designing an undetectable programmable logic controller rootkit via pin control attack.
2. Scada systems: challenges for forensic investigators;Ahmed;Computer,2012
3. Programmable logic controller forensics;Ahmed;IEEE Secur. Privacy,2017
4. Accurate modeling of the siemens s7 scada protocol for intrusion detection and digital forensics;Amit Kleinmann;J. Dig. Forensics Secur. Law,2014
5. Systems and Software Verification: Model-Checking Techniques and Tools;Berard,2001