1. [1] ICS-CERT: Recommended practices, ICS-CERT, https://ics-cert.us-cert.gov/Recommended-Practices.
2. [2] K. Kent and M. Souppaya: Guide to computer security log management, NIST Special Publication 800-92, NIST, 2006, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-92.pdf.
3. [3] JPCERT/CC: Use of logs and analysis methods for handling sophisticated cyber attacks, JPCERT/CC, 2015, https://www.jpcert.or.jp/research/APT-loganalysis_Report_20161019.pdf.
4. [4] Y. Tajima, T. Yamagata, H. Yamamoto, and A. Shimura: Anomaly detection based on event prediction for control system, The 29th Annual Conference of the Japanese Society for Artificial Intelligence, 2015.
5. [5] K. Stouffer, J. Falco, and K. Scarfone: Guide to industrial control systems (ICS) security, NIST Special Publication 800-82, NIST, 2013, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82.pdf.