References
- Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program. Idaho National Laboratory. IdahoFalls, Idaho 83415. November 2008. http://www.inl.gov/scada/publications/d/inl_nstb_ common_vulnerabilities.pdf
- Fink, R. Spencer, D., and Wells, R. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems. Idaho National Laboratory. Idaho Falls, Idaho 83415. September 2006. http://www.inl.gov/scada/publications/d/nstb_lessons_learned_from_cyber_security_assessments.pdf.
- Wireless Procurement Language in Support of Advanced Metering Infrastructure Security. Idaho National Laboratory. Idaho Falls, Idaho 83415. August 2009. http://www.inl.gov/scada/publications/d/inl-ext-09-15658_ami_proc_language.pdf.
- ESTEC Project. http://www.estec-project.eu/.
- Industrial Instrumentation Process Lab. http://www.bcit.ca/appliedresearch/tc/facilities/industrial.shtml.
- SCNI ACTION - IPSC - Europa ipsc.jrc.ec.europa.eu/fileadmin/.../JRC54499.pdf.
- "2010年度 制御システムの情報セキュリティ動向に関する調査報告書", IPA, 2011. http://www.ipa.go.jp/security/fy22/reports/ics_sec/index.html.
- "制御システムセキュリティ検討タスクフォース報告書". 経済産業省, 2012. http://www.meti.go.jp/committee/kenkyukai/shoujo/controlsystem_security/report01.html.
- Reaves, B., Morris, T., Discovery, Infiltration, and Denial of Service in a Process Control System Wireless Network. IEEE eCrime Researchers Summit. October 20-21, 2009. Tacoma, WA.
- T. Morris, A. Srivastava, B. Reaves, W. Gao, K. Pavurapu, R. Reddi, A control system testbed to validate critical infrastructure protection concepts, International Journal of Critical Infrastructure Protection (IJCIP), Volume 4, Issue 2, August 2011, Pages 88-103. https://doi.org/10.1016/j.ijcip.2011.06.005
- C. Davis, J. Tate, H. Okhravi, C. Grier, T. Overbye, and D. Nicol, "SCADA Cyber Security Testbed Development," in Power Symposium, 2006. NAPS 2006. 38th North American, pp. 483-488, 2006.
- Annarita Giani, Gabor Karsai, Tanya Roosta, Aakash Shah, Bruno Sinopoli, and Jon Wiley, "A testbed for secure and robust SCADA systems," in 14th IEEE real-time and embedded technology and applications symposium (RTAS '08) WIP session, 2008.
- C. Queiroz, A. Mahmood, Jiankun Hu, Z. Tari, and Xinghuo Yu, "Building a SCADA Security Testbed," in Network and System Security, 2009. NSS '09. Third International Conference on, pp. 357-364, 2009.
- I. Fovino, M. Masera, L. Guidi, and G. Carpi, "An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants," in Human System Interactions (HSI), 2010 3rd Conference on, pp. 679-686, 2010.
- A. Hahn et al., "Development of the Power Cyber SCADA security testbed," in Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10, p. 1, 2010.
- Rohan Chabukswar, Bruno Sinpoli, Gabor Karsai, Annarita Giani, Himanshu Neema, and Andrew Davis, "Simulation of Network Attacks on SCADA Systems," in First Workshop on Secure Control Systems, 2010.
- Bergman, David C., "Power grid simulation, evaluation, and test framework," Master's, University of Illinois, 2010.
- Jim Montague, "Simulation Breaks Out," Control Global, pp. 52-61, Sep-2010.