1 |
Y.-H. Chen, "Introduction of information security for industrial control system," Korea Institute of Information Security and Cryptology, 19(5), pp. 52-59, Oct. 2009.
|
2 |
Keith Stouffer, Joe Falco, and Karen Scarfone, "Guide to industrial control system security," NIST SP800-82, Jun. 2011.
|
3 |
N. Falliere, L. O. Murchu, and E. Chien, "Win32.stuxnet dossier," Symantec Security Response, Feb. 2011.
|
4 |
Y.S. Choi, "Middle investigation reports for korea hydro & nuclear power plant cyber terror incidents," The Joint Investigation Team for Personal Information Crimes, Mar. 2013
|
5 |
S.W. Shin, D.H. Kang, K.Y. Kim, and J.S. Jang, "Analysis of deep packet inspection technology," Electronics and Telecommunications Trends, 19(3), pp.117-124, Jun. 2004.
|
6 |
R. Stiennon, "DPI: next phase of firewall technology," Technology T-18-0340 Report, Gartner Group, Nov. 2002.
|
7 |
OPC Foundation, "OPC common 1.10 specification," OPC Task Force, Dec. 2002
|
8 |
Nathan Pocock, Darek Kominek, and Paul Hunkar, "OPC-UA security how it works," Information Revolution 2014, Aug. 2014
|
9 |
"OPC unified architecture-part 1:overview and concepts," IEC62541, International Electrotechnical Commission, Feb. 2010
|
10 |
H.W. Heinrich, Industrial accident prevention : a scientific approach, McGraw-Hill, New York, 366pg Jan. 1931
|