SCADA Protocol Vulnerabilities

Julian L. Rrushi. SCADA Protocol Vulnerabilities. In Javier Lopez, Roberto Setola, Stephen D. Wolthusen, editors, Critical Infrastructure Protection - Information Infrastructure Models, Analysis, and Defense. Volume 7130 of Lecture Notes in Computer Science, pages 150-176, Springer, 2012. [doi]

@incollection{Rrushi12,
  title = {SCADA Protocol Vulnerabilities},
  author = {Julian L. Rrushi},
  year = {2012},
  doi = {10.1007/978-3-642-28920-0_8},
  url = {http://dx.doi.org/10.1007/978-3-642-28920-0_8},
  researchr = {https://researchr.org/publication/Rrushi12},
  cites = {0},
  citedby = {0},
  pages = {150-176},
  booktitle = {Critical Infrastructure Protection - Information Infrastructure Models, Analysis, and Defense},
  editor = {Javier Lopez and Roberto Setola and Stephen D. Wolthusen},
  volume = {7130},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-28919-4},
}