P. Auffret 2010 ‘SinFP, unification of active and passive operating system fingerprinting’ Journal in Computer Virology 6 3 197 205 URL: https://doi.org/10.1007/s11416-008-0107-z
O. BilodeauD. LaPorteE. Kollman 2018 ‘FingerBank’. 11 03 2018 URL: https://fingerbank.org/
Browse Vulnerabilities By Date 2018 11 03 2018 URL: https://www.cvedetails.com/browse-by-date.php
M. CaselliD. HadŽiosmanovićE. ZambonF. Kargl 2013 On the Feasibility of Device Fingerprinting in Industrial Control Systems
I. E. Commission. (2003 ‘IEC 62264-1 Enterprise-control system integration–Part 1: Models and terminology’, IEC, Genf.
CORE Security 2018 ‘Pcapy’ 11 03 2018 URL: https://github.com/CoreSecurity/pcapy
R. Droms 1997 ‘RFC 2131-Dynamic Host Configuration Protocol, March 1997’, Obsoletes RFC1541. Status: DRAFT STANDARD 3 1)
Z. DurumericD. AdrianA. MirianM. BaileyJ. A. Halderman 2015a A Search Engine Backed by Internet-Wide Scanning ‘Proceedings of the 22nd ACM Conference on Computer and Communications Security’
Z. DurumericD. AdrianA. MirianM. BaileyJ. A. Halderman 2015b A Search Engine Backed by Internet-Wide Scanning ‘Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security’, ACM 542 553
A. HahnM. Govindarasu 2011 An evaluation of cybersecurity assessment tools on a SCADA environment ‘Power and Energy Society General Meeting, 2011 IEEE’, IEEE 1 6
E. Hjelmvik 2008 ‘Passive Network Security Analysis with NetworkMiner’, IN) Secure 18 1 100
IEEE Registration Authority 2018 11 03 2018 URL: http://regauth.standards.ieee.org/standardsra-web/pub/view.html
IEEE Standard for Local and Metropolitan Area Networks (2014), IEEE Std 802-2014 (Revision to IEEE Std 802-2001) pp. 1 74
I. KellnerL. Fiege 2009 Viewpoints in Complex Event Processing: Industrial Experience Report ‘Proceedings of the Third ACM International Conference on Distributed Event-Based Systems’, DEBS ’09 ACM 9:1 9:8 URL: http://doi.acm.org/10.1145/1619258.1619271
G. Lyon 2009 ‘Nmap–Free Security Scanner For Network Exploration & Security Audits’
J. C. Matherly 2009 ‘SHODAN the computer search engine’. URL: http://www.shodanhq.com/help
M. NiedermaierJ.-O. MalchowF. FischerD. MarzinD. MerliV. RothA. von Bodisco n.d. You Snooze, You Lose: Measuring PLC Cycle Times under Attacks ‘12th USENIX Workshop on Offensive Technologies (WOOT 18)’
M. Niedermaier, von A. BodiscoD. Merli 2018 CoRT: A Communication Robustness Testbed for Industrial Control System Components ‘4th International Conference on Event-Based Control, Communication, and Signal Processing EBCCSP 2018’
p0f v3 2018 11 03 2018 URL: http://lcamtuf.coredump.cx/p0f3/
PLCScan the Internet 2018 04 01 2018 URL: http://scadastrangelove.blogspot.de/2012/11/plcscan.html
D. C. Plummer 1982 ‘RFC 826: An Ethernet Address Resolution protocol’, InterNet Network Working Group
RiskViz 2018 11 03 2018 URL: https://www.riskviz.de
K. StoufferJ. FalcoK. Scarfone 2011 ‘Guide to Industrial Control Systems (ICS) Security’ NIST special publication 800 82 16 16
A. WedgburyK. Jones 2015 Automated Asset Discovery in Industrial Control Systems: Exploring the Problem ‘Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research’, ICS-CSR ’15 BCS Learning & Development Ltd., pp. 73 83 URL: https://doi.org/10.14236/ewic/ICS2015.8
B. ZhuA. JosephS. Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems ‘Internet of things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing’, IEEE 380 388