[1]. Eric D.Knapp, “Industrial Network Security”, Elsevier Inc, 2011.
[2]. Sjoerd Peerkamp, “Process Control Network Security”, ICT Security and Control, 2010.
[3]. Alvaro A.Cárdenas, Saurabh Amin, Shankar Sastry, “Research Challenges for the Security of Control Systems”, University of California, Berkeley, 2008.
[4]. A. Treytl, T. Sauter, C. Schwaiger, “Security measures for Industrial Fieldbus Systems – State of the Art and Solutions for IP-Based Approaches” in Proc. WFCS 2004 IEEE International Workshop on Factory Communication System, 2004.
[5]. M. Tangermann, D. Reinetl, “Security concept for automation networks” in Praxis Profiline Industrial Ethernet Volume D/E, Vogel Industrie Medien GmbH & Co. KG, Wurzburg, 2006.
[6]. Alvaro A.Cárdenas, Saurabh Amin, Shankar Sastry, S. Secure control: Towards survivable cyber-physical systems. In Proceedings of the First International Workshop on Cyber-Physical Systems, June 2008.
[7]. William Stallings, “Cryptography and Network security Principles and Practice”, Fifth Edition, 2011.
[8]. FIPS-197, National Institue of Standards and Technology, 11-2001.
[9]. AES page http://www.nist.gov/CryptoToolkit
[10]. P. Neumann, “Communication in industrial automation - what is going on?” in Control Engineering Practice. Elsevier Ltd, 2006, vol. 15, pp. 1332–1347.
[11]. Nguyễn Đào Trường, Nguyễn Đức Tâm, “Một phương pháp chống tấn công giả mạo trong hệ thống điều khiển”, Tạp chí Nghiên cứu KH-CN số 31, 06-2014, Tr. 104-108.
[12]. NIST SP 800-131A, “Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths”, 2011.
|