1. Ghost in the PLC: Designing an undetectable programmable logic controller rootkit via pin control attack;Abbasi,2016
2. Difficulties in modeling SCADA traffic: a comparative analysis;Barbosa,2012
3. Towards periodicity based anomaly detection in SCADA networks;Barbosa,2012
4. Viable system model for manufacturing execution systems;Brecher;Procedia CIRP,2013