1. Communication network dependencies for ICS/SCADA systems . European Network and Information Security Agency (ENISA) , 2016 . Communication network dependencies for ICS/SCADA systems. European Network and Information Security Agency (ENISA), 2016.
2. Detection and Resolution of Anomalies in Firewall Policy Rules
3. S. Adepu , N. K. Kandasamy , and A. Mathur . Epic: An electric power testbed for research and training in cyber physical systems security . In Computer Security , pages 37 -- 52 . Springer , 2018 . S. Adepu, N. K. Kandasamy, and A. Mathur. Epic: An electric power testbed for research and training in cyber physical systems security. In Computer Security, pages 37--52. Springer, 2018.
4. Conflict classification and analysis of distributed firewall policies
5. B. J. Argauer and S. J. Yang . Vtac: Virtual terrain assisted impact assessment for cyber attacks. In Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, volume 6973, page 69730F . International Society for Optics and Photonics , 2008 . B. J. Argauer and S. J. Yang. Vtac: Virtual terrain assisted impact assessment for cyber attacks. In Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, volume 6973, page 69730F. International Society for Optics and Photonics, 2008.