Coffey, K., Smith, R., Maglaras, L., Janicke, H. (2018).
Vulnerability analysis of network scanning on SCADA
systems. Security and Communication Networks, 2018.
CUI Devices (2020). RS-485 serial interface explained.
Cunha, C., Rein, O., Jardini, J., Magrini, L. (2004). Electri-
cal utilities control center data exchange with iccp and
cim/xml. In 2004 IEEE Transmission and Distribution
Conference & Exposition, pg. 260–265. IEEE.
Davis, C., Tate, J., Okhravi, H., Grier, C., Overbye, T.,
Nicol, D. (2006). SCADA cyber security testbed devel-
opment. In 2006 38
th
North American Power Sympo-
sium, pg. 483–488. IEEE.
Dehlaghi-Ghadim, A., Balador, A., Moghadam, M., Hans-
son, H., Conti, M. (2023). Icssim - a framework for
building industrial control systems security testbeds.
Computers in Industry, 148:103906.
Drias, Z., Serhrouchni, A., Vogel, O. (2015). Taxonomy of
attacks on industrial control protocols. In 2015 Interna-
tional Conference on Protocol Engineering, pg. 1–6.
IEEE.
East, S., Butts, J., Papa, M., Shenoi, S. (2009). A taxonomy
of attacks on the dnp3 protocol. In Internatio-nal Con-
ference on Critical Infrastructure Protection, pg. 67–81.
Springer.
Esquivel-Vargas, H., Caselli, M., Peter, A. (2017). Au- to-
matic deployment of specification-based intrusion de-
tection in the bacnet protocol. In Proc. of the 2017
Workshop on Cyber-Physical Systems Secuity and Pri-
vacy, pg. 25–36.
FieldComm Group. Wirelesshart.
Formby, D., Rad, M., Beyah, R. (2018). Lowering the bar-
riers to industrial control system security with
{GRFICS}. In 2018 USENIX Workshop on Advances
in Security Education.
Fovino, I., Carcano, A., Masera, M., Trombetta, A. (2009).
Design and implementation of a secure mod- bus pro-
tocol. In International conference on critical infrastruc-
ture protection, pg. 83–96. Springer.
Hussain, S., Ustun, T., Kalam, A. (2019). A review of iec
62351 security mechanisms for iec 61850 message ex-
changes. IEEE Transactions on Industrial Informatics,
16(9):5643–5654.
Ilgner, P., Cika, P., Stusek, M. (2021). Scada-based mes-
sage generator for multi-vendor smart grids: Distribut-
ed integration and verification of tase. 2. Sensors,
21(20):6793.
Incorporated, A. (2005). BusWorks® 900EN Series: 10/
100M Industrial Ethernet I/O Modules w/Modbus.
Kosanke, K. (2006). Iso standards for interoperability: A
comparison. In Interoperability of enterprise software
and applications, pg. 55–64. Springer.
Liljenstam, M., Liu, J., Nicol, D., Yuan, Y., Yan, G., Grier,
C. (2005). Rinse: The real-time immersive network si-
mulation environment for network security exercises.
In Workshop on Principles of Advanced and Distribu-
ted Simulation, pg. 119–128. IEEE.
Macaulay, T., Singer, B. L. (2011). Cybersecurity for indu-
strial control systems: SCADA, DCS, PLC, HMI, and
SIS. CRC Press.
Mackiewicz, R. E. (2006). Overview of iec 61850 and ben-
efits. In 2006 IEEE Power Engineering Society General
Meeting, pg. 8–10. IEEE.
Mai, K., Qin, X., Silva, N., Cardenas, A. (2019). Iec 60870-
5-104 network characterization of a large-scale opera-
tional power grid. In 2019 IEEE Security and Privacy
Workshops, pg. 236–241. IEEE.
Maidl, M., Kroselberg, D., Christ, J., Beckers, K. (2018). A
comprehensive framework for security in engineering
projects-based on iec 62443. In 2018 IEEE Interna-
tional Symposium on Software Reliability Engineering
Workshops, pg. 42–47. IEEE.
Mallouhi, M., Al-Nashif, Y., Cox, D., Chadaga, T., Hariri,
S. (2011). A testbed for analyzing security of SCA-DA
control systems. In ISGT 2011, pg. 1–7. IEEE.
Marais, H. (2008). Rs-485/rs-422 circuit implementation
guide. AN-960 Analog Devices.
Mattioli, R., Moulinos, K. (2015). Analysis of ICS-SCADA
cyber security maturity levels in critical sec-tors.
Modbus Organization (2006). Modbus messaging on TCP/
IP Implementation Guide V1.
Journal on Wireless Communications and Networking,
2012(1):1–17.
Newman, H. (2013). Bacnet explained. ASHRAE Journal.
ODVA (2006). Common Industrial Protocol (CIP).
OPS Telecom (2023). Understanding modbus protocol - rtu
vs tcp vs ascii.
Page, M., et al. (2021). The Prisma 2020 statement: An
updated guideline for reporting systematic reviews. 88:
105906.
Pan, J., Jain, R. (2008). A survey of network simulation to-
ols: Current status and future developments. 2(4):45.
Parcharidis, M. (2018). Simulation of cyber-attacks against
scada systems.
Peacock, M. (2019). Anomaly detection in bacnet/ip
managed building automation systems.
Peacock, M., Johnstone, M., Valli, C., Camp, O., Mori, P.,
Furnell, S. (2017). Security issues with bacnet value
handling. In ICISSP, pg. 546–552.
Qassim, Q., et al., (2017). A survey of SCADA testbed imp-
lementation approaches. Indian Journal of Science and
Technology, 10(26):1–8.
Queiroz, C., Mahmood, A., Tari, Z. (2011). Scada-sim - A
framework for building scada simulations. IEEE
Transactions on Smart Grid, 2(4):589– 597.
Radoglou-Grammatikis, P., Sarigiannidis, P., Giannoula-
kis, I., Kafetzakis, E., Panaousis, E. (2019). Attacking
iec-60870-5-104 SCADA systems. In 2019 IEEE
World Congress on Services, vol. 2642, pg. 41–46.
IEEE.
Slatman H. A curated list of resources related to Industrial
Control System (ICS) security.
Sidhu, T., Kanabar, M., Parikh, P. (2008). Implementation
issues with iec 61850 based substation automation
systems. In 15
th
National Power Systems Conference,
pg. 473–478.
Song, J., Han, S., Mok, A., Chen, D., Lucas, M., Nixon, M.,
Pratt, W. (2008). Wirelesshart: Applying wireless
technology in real-time industrial process control. In