1. A survey of IIoT protocols: A measure of vulnerability risk analysis based on CVSS;Figueroa;ACM Comput. Surv.,2020
2. . OPCFoundation, OPC, https://opcfoundation.org/.
3. Automatic deployment of specification-based intrusion detection in the bacnet protocol;Esquivel-Vargas,2017
4. CopyCAN: An error-handling protocol based intrusion detection system for controller area network;Longari,2019
5. A cyber-physical model for SCADA system and its intrusion detection;Sheng;Comput. Netw.,2021