5Pavurapu K. A retrofit network transaction data logger for SCADA control systems[D]. Mississippi State University, 2010.25.
6Radvanovsky R, Brodsky J. Handbook of SCADA Control Systems Security[M]. CRC Press, 2013.34.
7Patel S C. Secure Internet-based communication protocol for SCADA networks[D]. University of Louisville, 2006.15-17.
8Kuipers D G. Common Cyber Security Vulnerabilities Obseved in Control System Assessments by the INL NSTB Program[R]. Idaho National Laboratory, 2008.
9Thomas M S, Kumar P, Chandna V K. Design, development, and commissioning of a supervisory control and data acquisition (SCADA) laboratory for research and training[J]. IEEE Transactions on Power Systems. 2004, 19(3): 1582-1588.