Paganini Threat Landscape Stakeholder Group “The Number Of ICS Attacks Continues To Increase Worldwide” Security Affairs N.p. 2017
C. AlcarazG. FernandezF. Carvajal Security aspects of SCADA and DCS environments Critical Infrastructure Protection J. LopezR. SetolaS.
Martin Solum “Quickdraw Retrospective, Part #1” Digital Bond November 17 2009 http://www.digitalbond.com/2009/11/17/quickdraw-retrospective-part-1/; “Quickdraw Retrospective, Part #2” Digital Bond November 19 2009 http://www.digitalbond.com/2009/11/19/quickdraw-retrospective-part-2/;.
A. DulaunoyG. WagenerC. Wagner 2017 An extended analysis of an IoT malware from a blackhole network 50), 13 15
M. AntonakakisT. AprilM. BaileyE. BurszteinJ. CochranZ. DurumericB. Yi Zhou 2017 Understanding the Mirai Botnet Proceedings of the 26th USENIX Security Symposium 1093 1110 Retrieved from https://www.usenix.org/conference/usenixsecurit y17/technical-sessions/presentation/antonakakis
T. AlvesR. DasT. Morris 2016 Virtualization of Industrial Control System Testbeds for Cybersecurity Proceedings of the 2nd Annual Industrial Control System Security Workshop on - ICSS ’16 10 14 http://doi.org/10.1145/3018981.3018988
T. AlvesM. BurattoF. de SouzaT. Rodrigues “OpenPLC: An open source alternative to automation” in 2014 IEEE Global Humanitarian Technology Conference (GHTC) 585 589 Oct. 2014 10.1109/GHTC.2014.6970342
Bonnie ZhuAnthony JosephShankar Sastry “A taxonomy of cyber attacks on SCADA systems” In Internet of things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing 380 388 IEEE 2011
Bronk ChristopherTikk-Ringas Eneken “The Cyber Attack On Saudi Aramco”. http://dx.doi.org/10.1080/00396338.2013.784468
Nicolas FalliereLiam O. MurchuEric Chien “W32. stuxnet dossier” White paper, Symantec Corp., Security Response 5 2011
U. AdhikariT. MorrisS. Pan Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification IEEE Transactions on Smart Grid 10.1109/TSG.2017.2647778
U. AdhikariT. MorrisS. Pan 2017 Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification IEEE Transactions on Smart Grid
P. ChinthakaC. PremachandraS. Amarakeerthi 2018 Effective natural communication between human hand and mobile robot using Raspberry-pi 2018 IEEE International Conference on Consumer Electronics (ICCE)
J. Mihal’ovM. Hulic 2017 NFC/RFID technology using Raspberry Pi as platform used in smart home project 2017 IEEE 14th International Scientific Conference on Informatics
David ArthurSergei Vassilvitskii Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms Society for Industrial and Applied Mathematics 2007
D. ZhangL. LiuG. Feng 2018 Consensus of Heterogeneous Linear Multiagent Systems Subject to Aperiodic Sampled-Data and DoS Attack IEEE Transactions on Cybernetics 1 11
P. FarinaE. CambiasoG. PapaleoM. Aiello 2015 Understanding DDoS Attacks from Mobile Devices 2015 3rd International Conference on Future Internet of Things and Cloud
J. ZhuY. WangD. ZhouF. Gao 2018 Batch Process Modeling and Monitoring With Local Outlier Factor IEEE Transactions on Control Systems Technology 1 14
M. NishatD. lnshilD. ZhouC. KiJoon 2017 Evolving Neural Network Intrusion Detection System for MCPS 2018 20th International Conference on Advanced Communication Technology (ICACT)