T. AlvesR. DasT. Morris 2018 Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers IEEE Embedded Systems Letters 10 3 99 102 [Cross Ref] [Online]
E.G. DadaJ.S. BassiO.O. Adekunle 2017 An Investigation into the Effectiveness of Machine Learning Techniques for Intrusion Detection. Arid Zone Journal of Engineering, Technology and Environment 13 764 778
W. FengQ. ZhangG. HuJ. X. Huang 2014 Mining network data for intrusion detection through combining SVMs with ant colony networks Future Generation Computer Systems 37 127 140 [Cross Ref] [Online]
C. FengT. LiD. Chana 2017 Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Denver, CO, USA IEEE 261 272 [Cross Ref] [Online] 25 June 2019
E. FrankM. A. HallI. H. Witten 2016 The WEKA Workbench. Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition Morgan Kaufman [Online]. Available at https://www.cs.waikato.ac.nz/ml/weka/Witten_et_al_2016_appendix.pdf 6 May 2019
D. HadžiosmanovićL. SimionatoD. BolzoniE. ZambonS. Etalle 2012 N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols D. BalzarottiS. J. StolfoM. Cova Research in Attacks, Intrusions, and Defenses, Lecture Notes in Computer Science, Springer Berlin Heidelberg 354 373
M. S. HasanT. DeanF. T. ImamF. GarciaS. P. LeblancM. Zulkernine 2017 A Constraint-based intrusion detection system Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems - ECBS ’17 Larnaca, Cyprus ACM Press 1 10 [Cross Ref] [Online] 25 June 2019
D. E. King 2009 Dlib-ml: A Machine Learning Toolkit The Journal of Machine Learning Research 10 1 1755 1758
S. Lacey 2013 Hackers Penetrate Google’s Building Management System [Online]. Available at https://www.greentechmedia.com/articles/read/hackers-penetrate-googles-building-management-system 9 February 2019
J. Moos 2015 Cyber Forensics in a Post Stuxnet World ITNOW 57 4 32 33 [Cross Ref] [Online]
Office for National Statistics 2015 A Short Guide to the National Accounts Office for National Statistics [Online]. Available at http://www.ons.gov.uk/ons/guide-method/method-quality/specific/economy/national-accounts/articles/2011-present/uk-national-accounts—a-short-guide–2014.pdf 9 February 2019
OMRON 2001 FINS Commands REFERENCE MANUAL OMRON [Online]. Available at https://www.myomron.com/downloads/1.Manuals/Networks/W227E12_FINS_Commands_Reference_Manual.pdf 27 April 2019
OMRON 2009 SYSMAC CS and CJ Series CS1W-ETN21 (100Base-TX) CJ1WETN21 (100Base-TX) Ethernet Units Construction of Applications OPERATION MANUAL OMRON [Online]. Available at https://assets.omron.eu/downloads/manual/en/v2/w421_cj1w-etn21_cs1wetn21_ethernet_units_-_construction_of_applications_operation_manual_en.pdf
F. PedregosaG. VaroquauxA. GramfortV. MichelB. ThirionO. GriselM. BlondelP. PrettenhoferR. WeissV. DubourgJ. VanderplasA. PassosD. Cournapeau 2011 Scikit-learn: Machine Learning in Python MACHINE LEARNING IN PYTHON 6
Shodan Industrial Control Systems [Online]. Available at https://www.shodan.io/explore/category/industrial-control-systems 2 February 2019
B. SteinkeB. Rickel 2011 Make sense of third-party maintenance for your automatic welding system: working with third-party PM providers allows more focus on core competencies. Plant Engineering 65 49-
James Michael StewartE. TittelM. ChappleJames M. Stewart 2008 Cissp: Certified Information Systems Security Professional Study Guide Fifth Indianapolis, UNITED STATES John Wiley & Sons, Incorporated (includes CD-ROM), [Online]. Available at http://ebookcentral.proquest.com/lib/open/detail.action?docID=353313 8 May 2019
J. StirlandK. JonesH. JanickeT. Wu 2014 DEVELOPING CYBER FORENSICS FOR SCADA INDUSTRIAL CONTROL SYSTEMS The Society of Digital Information and Wireless Communication 98 111 [Online]. Available at https://www.researchgate.net/publication/266477470_Developing_Cyber_Forensics_for_SCADA_Industrial_Control_Systems 5 June 2017
J. WangL. ZhouX. LuH. YingH. Wang 2017 Towards a Novel Protocol Analysis Framework for Industrial Control Systems Smart Computing and Communication Springer, Cham 449 456 [Cross Ref] [Online] 6 May 2019
S. ZhanweiL. Zenghui 2019 Abnormal detection method of industrial control system based on behavior model Computers & Security 84 166 178 [Cross Ref] [Online]