Associated Press (viewed 26.06.2017) Flights cancelled at Schiphol airport as power outage hits Amsterdam https://www.theguardian.com/world/2015/mar/27/flights-cancelled-schipholairport-power-outage-amsterdam
R. R. R BarbosaR SadreA Pras 2013 Flow whitelisting in SCADA networks International journal of critical infrastructure protection 6 3-4 150 158
A. A CárdenasS AminZ.-S LinY.-L HuangC.-Y HuangS Sastry 2011 Attacks against process control systems: risk assessment, detection, and response In Proceedings of the 6th ACM symposium on information, computer and communications security 355 366 ACM
M. CaselliE ZambonF Kargl 2015 Sequence-aware intrusion detection in industrial control systems In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security 13 24 ACM
CENELEC 1988 Harmonisation Document: Nominal voltage for low voltage public electricity supply systems, HD 472 S1
J. J. ChromikA RemkeB. R Haverkort 2016a Improving SCADA security of a local process with a power grid model In Proceedings of the 4th International Symposium for ICS&SCADA Cyber Security Research, Queen’s Belfast University, UK 114 123 BCS Learning & Development Ltd [Cross Ref]
J. J. ChromikA RemkeB. R Haverkort 2016b What’s under the hood? Improving SCADA security with process awareness In Proceedings of the Joint Workshop on Cyber- Physical Security and Resilience in Smart Grids Vienna, Austria 1 6 IEEE [Cross Ref]
G. R. ClarkeD ReyndersE Wright 2004 Practical modern SCADA protocols: DNP3, 60870.5 and related systems Newnes
I. N. FovinoA CarcanoT. D. L MurelA TrombettaM Masera 2010 Modbus/DNP3 state-based intrusion detection system In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on 729 736 IEEE
D. HadžiosmanovićD BolzoniP. H Hartel 2012 A log mining approach for process monitoring in SCADA International Journal of Information Security 11 4 231 251
D. HadžiosmanovićR SommerE ZambonP. H Hartel 2014 Through the eye of the PLC: semantic security monitoring for industrial processes In Proceedings of the 30th Annual Computer Security Applications Conference 126 135 ACM.
ICS-CERT (released February 25, 2016) Alert (IR-ALERT-H-16-056-01) Cyber-Attack Against Ukrainian Critical Infrastructure Available online: https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01 10 Mar 2018
ICS-CERT (released September 29, 2010) Advisory (ICSA-10-272-01), Primary Stuxnet Advisory https://ics-cert.us-cert.gov/advisories/ICSA-10-272-01 10 Nov 2017
IEC101 2003 IEC TS 60870-5-101:2003. Technical specification, TC 57 - Power systems management and associated information exchange Geneva
IEC104 2013 IEC TS 60870-5-7:2013. Technical specification, TC 57 - Power systems management and associated information exchange Geneva
H. LinA SlagellC Martino DiZ KalbarczykR. K Iyer 2013 Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol In Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop 5 ACM
H. LinA SlagellZ KalbarczykP. W SauerR. K Iyer 2013 Semantic security analysis of SCADA networks to detect malicious control commands in power grids Proceedings of the first ACM workshop on Smart energy grid security 29 34 ACM
J. NivethanM Papa 2016a A SCADA Intrusion Detection Framework that Incorporates Process Semantics In Proceedings of the 11th Annual Cyber and Information Security Research Conference 6 ACM
J. NivethanM Papa 2016b Dynamic rule generation for SCADA intrusion detection. In Technologies for Homeland Security (HST) 2016 IEEE Symposium on 1 5 IEEE
V. Paxson 1999 Bro: a system for detecting network intruders in real-time Computer networks 31 23 2435 2463 [Cross Ref]
M. Roesch 1999 Snort - Lightweight Intrusion Detection for Networks In Proceedings of the 13th USENIX Conference on System Administration, Seattle, WA, USA, LISA ’99 229 238 USENIX Association [Cross Ref]
R. SommerJ AmannS Hall 2016 Spicy: a unified deep packet inspection framework for safely dissecting all your data In Proceedings of the 32nd Annual Conference on Computer Security Applications 558 569 ACM
R. UddM AsplundS NadjmM Tehrani-KazemtabriziM Ekstedt 2016 Exploiting bro for intrusion detection in a SCADA system In Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security 44 51 ACM
Y. YangK McLaughlinT LittlerS SezerB PranggonoH Wang 2013 Intrusion detection system for IEC 60870-5-104 based SCADA networks In Power and Energy Society General Meeting (PES), 2013 IEEE 1 5 IEEE