Julian L. Rrushi. SCADA Protocol Vulnerabilities. In Javier Lopez, Roberto Setola, Stephen D. Wolthusen, editors, Critical Infrastructure Protection - Information Infrastructure Models, Analysis, and Defense. Volume 7130 of Lecture Notes in Computer Science, pages 150-176, Springer, 2012. [doi]
@incollection{Rrushi12, title = {SCADA Protocol Vulnerabilities}, author = {Julian L. Rrushi}, year = {2012}, doi = {10.1007/978-3-642-28920-0_8}, url = {http://dx.doi.org/10.1007/978-3-642-28920-0_8}, researchr = {https://researchr.org/publication/Rrushi12}, cites = {0}, citedby = {0}, pages = {150-176}, booktitle = {Critical Infrastructure Protection - Information Infrastructure Models, Analysis, and Defense}, editor = {Javier Lopez and Roberto Setola and Stephen D. Wolthusen}, volume = {7130}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-28919-4}, }