5Abdullah KHALILI,Mahsa KEIKHA,Ashkan SAMI.Recovery Scheme for Industrial Control Systems. 5th Conference on Information and Knowledge Technology . 2013
6Chee-Wooi TEN,Chen-Ching LIU,Manimaran GOVINDARASU.Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees. IEEE Transactions on Power Systems . 2012
7M.T.O.Amanullah,A.KALAM,A.ZAYEGH.Network Security Vulnerabilities in SCADA and EMS. IEEE/PES Transmission and Dislribution Conference&Exhibition; . 2005
8Ting WANG.Design and Implementation of Fuzzing Technology for Opc Protocol. Ninth International Conference on IntelligenL Information Hiding and Multimedia Signal Processing . 2013