References
- Baker, George H., and Allan Berg. "Supervisory control and data acquisition (SCADA) systems." The Critical Infrastructure Protection Report 1.6 (2002).
- Shahzad, A., et al. "The SCADA review: system components, architecture, protocols and future security trends." American Journal of Applied Sciences 11.8 (2014): 1418. https://doi.org/10.3844/ajassp.2014.1418.1425
- Sajid, Anam, Haider Abbas, and Kashif Saleem. "Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges." IEEE Access 4 (2016): 1375-1384. https://doi.org/10.1109/ACCESS.2016.2549047
- Luders, Stefan. Control systems under attack?. No. CERN-OPEN-2005-025. 2005.
- H. M. N. Al Hamadi, C. Y. Yeun, and M. J. Zemerly, "A novel security scheme for the smart grid and SCADA networks,'' Wireless Pers. Commun., vol. 73, no. 4, pp. 1547-1559, 2013. , https://doi.org/10.1007/s11277-013-1265-y
- U.S. Department of Homeland Security, "ICSALERT-13-016-02: Offline Brute-Force Password Tool Targeting Siemens S7," ICS-CERT, December 2013. Available: https://ics-cert.us-cert.gov/alerts/ICSALERT-13-016-02.
- Syverson, Paul. "A taxonomy of replay attacks [cryptographic protocols]." Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings. IEEE, 1994.
- H. M. N. Al Hamadi, C. Y. Yeun, and M. J. Zemerly, "A novel security scheme for the smart grid and SCADA networks,'' Wireless Pers. Commun., vol. 73, no. 4, pp. 1547-1559, 2013. , https://doi.org/10.1007/s11277-013-1265-y
- Baker, George H., and Allan Berg. "Supervisory control and data acquisition (SCADA) systems." The Critical Infrastructure Protection Report 1.6 (2002).
- http://www.etnews.com/20160405000068, 전자신문 etnews, 2016,04.05
- Coffed, Jeff. "The threat of GPS jamming: The risk to an information utility." Report of EXELIS, Jan (2014)
- 3. 신천식. "GPS 전파교란 대응기술 동향." TTA Journal 149 (2013): 92-99.
- New Technologies deployed to counter the threat of GPS Jamming,' Cellular-news, 2013. 2. 13
- 임종인, and 장규현. "전자적 제어시스템 침해 위협에 따른 법적 대응방안." 정보보호학회지 20.4 (2010): 52-65.
- http://www.telegraph.co.uk/news/worldnews/1575293/Schoolboy-hacks-into-citys-tram-system.html, The telegraph, 11 Jan 2008, By Graeme Baker
- Poulsen, Kevin. "Hacker disables more than 100 cars remotely." Internet]. Available: www.wired.com/threatlevel/2010/03/hacker-bricks-cars (2010).
- Greenberg, Andy. "Hackers remotely kill a jeep on the highway-With me in it." Wired 7 (2015): 21.
- Ghena, Branden, et al. "Green Lights Forever: Analyzing the Security of Traffic Infrastructure." WOOT 14 (2014): 7-7.
- Ishtiaq Roufa, Rob Millerb, et al. "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study." 19th USENIX Security Symposium, Washington DC. 2010
- Francillon, Aurélien, Boris Danev, and Srdjan Capkun. "Relay attacks on passive keyless entry and start systems in modern cars." Proc. Network and Distributed System Security Symp.
- Radcliffe, Jerome. "Hacking medical devices for fun and insulin: Breaking the human SCADA system." Black Hat Conference presentation slides. Vol. 2011. 2011.