1Stouffer K, Falco J, Scarfone K. Guide to Industrial Control Systems (ICS) Security, NIST: special publication 800- 82 [R]. 2011. 被引量:1
2Falliere N, Murchu L O, Chien E. W32. Stuxnet dossier, Symantec white paper [R]. 2010. 被引量:1
3Bencsdth B, Pek G, Buttydn L, et al. Duqu: A Stuxnet-like malware found in the wild [R/OL]. (2011-10). http:// www. crysys, hu/publications/files/bencsathPBFllduqu, pdf. 被引量:1
4sKyWlper Analysis Team. sKyWlper (a. k.a. Flame a. k. a. Flamer) : A complex malware for targeted attacks [R/OL]. (2012 05). http://www, crysys, hu/skywiper/skywiper, pdf. 被引量:1
5Caselli M, Had?iosmanovi? D, Zambon E, et al. On the feasibility of device fingerprinting in industrial control systems [C]// 8th International Workshop on Critical Information Infrastructures Security, CRITIS. 2013:155 - 166. 被引量:1
6Cheminod M, Durante L, Valenzano A. Review of security issues in industrial networks [J]. IEEE Transactions on Industrial Informatics, 2013, 9(1).. 277- 293. 被引量:1
7Barbosa R R R, Sadre R, Pras A. A first look into SCADA network traffic [C]//Proceedings of 2012 IEEE Network Operations and Management Symposium, NOMS. 2012. 被引量:1
8Pleijsier E. Towards anomaly detection in SCADA networks using connection patterns [C]// 18th Twente Student Conference on IT. 2013. 被引量:1
9Crotti M, Dusi M, Gringoli F, et al. Traffic classification through simple statistical fingerprinting [J]. SIGCOMM Comput Commun Rev, 2007, 37(1) : 5 - 16. 被引量:1
10Garitano I, Siaterlis C, Genge B, et al. A method to construct network traffic models for process control systems [C]// Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies and Factory Automation, ETFA. 2012. 被引量:1