1. Ics/scada device recognition: A hybrid communication-patterns and passive-fingerprinting approach;Al Ghazo,2019
2. Al-Naami, K., Chandra, S., Mustafa, A., Khan, L., Lin, Z., Hamlen, K., et al. (2016). Adaptive Encrypted Traffic Fingerprinting with Bi-directional Dependence. In Proceedings of the 32nd annual conference on computer security applications (pp. 177–188).
3. Anderson, B., & McGrew, D. (2019). TLS beyond the Browser: Combining End Host and Network Data to Understand Application Behavior. In Proceedings of the internet measurement conference (pp. 379–392).
4. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., et al. (2017). Understanding the Mirai Botnet. In 26th {USENIX} security symposium ({USENIX} security 17) (pp. 1093–1110).
5. Market Share Of Different PLCs;Automation,2018