1 |
Abawajy, J. and Robles, R. J., "Secured Communication scheme for SCADA in Smart Grid Environment," Journal of Security Engineering, Vol. 7, No. 6, 2010.
|
2 |
Bailer, D. and Wright, E., "Practical SCADA for industry," Burlington: Newnes, 2003.
|
3 |
Barbosa, R. R. R. and Pras, A., "Intrusion Detection in SCADA Networks," International Federation for Information Processing, pp. 163-166, 2010.
|
4 |
Belekar, S. B., Desai, A. A., and Dakre, A., "PLC SCADA based Distribution Monitoring & Control," Multidisciplinary Journal of Research in Engineering and Technology, Vol. 1, , No. 1, pp. 105-110, 2014.
|
5 |
DiNanno, J. M. and Changy, D., "Selecting the right RTU and SCADA System," Whitmor/Technotrade, Sept, 2005.
|
6 |
Geoke, D. and Nguyen, H., "SCADA System Security," ECE 478-Network Security, Oregon State University, March, 2005.
|
7 |
Graham, J. H. and Patel, S. C., "Security considerations in SCADA communication Protocols," Intelligent System Research Laboratory Tecchnical Report, University of Louisvile, September, 2004.
|
8 |
Hentea, M., "Improving Security for SCADA Control systems," Interdisciplinary Journal of Information, Knowledge, and Management, Vol. 3, 2008.
|
9 |
Hong, S. J., "Industrial network technologies and applications," C&I, special Issue, May, 2010.
|
10 |
Jung, S. B. and Yang, S. I., "A study on effective management method of the flood forecast system using PDA," Journal of Korea Information Processing Society, Vol. 17-A, No. 4, October, 2010.
|
11 |
Kang, D. J. and Robles, R. J., "Compartmentalization of Protocols in SCADA Communication," International Journal of Advenced Science and Technology, Vol. 8, pp. 27-36, 2009.
|
12 |
Kim, S. J., Lim, T. S., and Kim, M. S., "A case study on implementation of Integrated Operation System of the Nakdong River Estuary Barrage due to the barrage gate extension," Journal of Society for e-Business studies, Vol. 20, No. 1, 2015.
|
13 |
Know all about SCADA Systems Architecture and Types with Applications, Tarun Agarwal, http://www.edgefxkits.com/blog/scada-system-architecturetypes-applications/.
|
14 |
Korea Water Resources Corporation, "Analytic research about the effect of water operation system(Water-K) application," 2010.
|
15 |
Korea Water Resources Corporation, "Nakdong River Estuary Barrage operation & management manual," December, 2008.
|
16 |
Korea Water Resources Corporation, "Water Resource & Environment Basic Research Work Standard," 2010.
|
17 |
KT, "Report for Troubleshooting about Communication system in KT," 2007.
|
18 |
Kumar, B., Pantnaik, M., and Kumar, R, "Canal Water Management Through Computerised Supervisory Control and Data Acquisition System," 16th National Convention of Computer Engineers held at Patna on December 15-16, 2001.
|
19 |
Ldachaba, F. E., "Review of Remore Terminal Unit(RTU) and Gateways for Digital Oilfield developments," International Journal of Advenced Computer Science and Applications, Vol. 3, No. 8, pp. 157-160, 2012.
|
20 |
Laboratory of system, Security certification team, "Security Objectives Statements," Oullim Information Technology, October, 2009.
|
21 |
Najm, O. S., Alkhaddar, A. R. M., and Hadi, H. A., "The use of SCADA system in water resources management, management of Shatt Al-Hilla in Iraq as a case study," International Journal of Environmental Monitoring and Analysis, October 30, 2013.
|
22 |
Rijo, M., Lanhoso, A., and Nunes, M., "Design and implementation of an irrigation canal SCADA," ICAAM, 2005.
|
23 |
Robles, R. J., Choi, M. K., Kim, S. S., Park, G. C., and Yeo, S. S., "Vulnerabilities in SCADA and Critical Infrastructure Systems," International Journal of Future Generation Communication and Networking, Vol. 1, No. 1, pp. 99-104, December, 2008.
|
24 |
Stoian, I., Capatina, D., Ignat, S., and Ghiran, O., "Security and Intrusion Detection on Critical SCADA systems for Water Management," IEEE, 978-1-4799-3732-5/14, 2014.
|
25 |
Three generations of SCADA system architectures, Edvard Csanyi, http://electrical-engineering-portal.com/three-generations-of-scada-system-architectures.
|