참고문헌
- S.W. Shin, D.H. Kang, K.Y. Kim, and J.S. Jang, "Analysis of deep packet inspection technology", Electronics and Telecommunications Trends, Vol 19, no. 3, pp.117-124, 2004.
- R. Stiennon, "DPI: next phase of firewall technology", Technology T-18-0340 Report, Gartner Group, 2002.
- Y.-H. Chen, "Introduction of information security for industrial control system", Korea Institute of Information Security and Cryptology, Vol. 19, no. 5, pp.52-59, 2009.
- openADR Alliance, http://www.openadr.org
- openADR 2.0 Profile Specification A Profile, openADR Alliance, 2011
- Zigbee Alliance, http://www.zigbee.org
- Electricity Metering Data Exchange - The DLMS/COSEM suite - Part5-3: DLMS/COSEM application layer, lEC 62056-5-3 Ed.1.0, International Electrotechnical Commission, 2013.
- Electricity Metering Data Exchange - The DLMS/COSEM SUITE-Part6-1: COSEM Object Identification System (OBIS), IEC 62056-6-1 Ed.1.0, International Electrotechnical Commission, 2013.
- Electricity Metering Data Exchange - The DLMS/COSEM suite-Part6-2: COSEM interface classes, IEC 62056-6-2 Ed.1.0, International Electrotechnical Commission, 2013.
- Nathan Pocock, Darek Kominek, and Paul Hunkar, "OPC-UA security how it works", Information Revolution 2014, 2014.
- OPC unified architecture - part 1 :overview and concepts, IEC62541, International Electrotechnical Commission, Feb. 2010.
- DNP User Group, "DNP V3.00 Documentation", DNP Product Documentation, 1995.
- Electronic Engineering Co., "The Concept of CAN Protocol," Electronic Engineering Magazine, pp.114-120, 1998.
- Z. Shelby, K. Hartke, and C. Bormann, The Constrained Application Protocol (CoAP), IETF RFC 7252, IETF, 2014.
- MQTT Version 3.1.1 OASIS Standard. 2014.