[1]S. Boyer, “Scada: Supervisory Control And Data Acquisition,” 2009.
[2]N. Flix, G. Dumortier, A. Aïtouche, A. Gehin, and M. Staroswiecki, “Generic control/command distributed system, European Control Conference (ECC),” 1999.
[3]J. Fernandez and A. Fernandez, “SCADA systems: Vulnerabilities and remediation,” J. Comput. Sci. Colleges Arch., vol.20, no. 4, pp. 160-168, 2005.
[4]S. Patel and Y. Yu, “Analysis of SCADA Security Models,” International Management Review Vol. 3 No. 2, pp. 68-76, 2007.
[5]“Security technologies for industrial automation and control systems,” Instrum. Syst. Autom. Soc., Research Triangle Park, NC, ANSI/ISATR99.00.01-2007, 2007.
[6]“Integrating electronic security into the manufacturing and control systems environment,” Instrum. Syst. Autom. Soc., Research Triangle Park, NC, ANSI/ISA-TR99.00.02-2004, 2007.
[7]“System protection profile—industrial control systems v1.0,” Nat. Inst. Standards Technol., Gaithersburg, MD, 2004.
[8]“API 1164: Pipeline SCADA Security,” Washington, DC: American Petroleum Inst, 2004.
[9]“Cryptographic protection of SCADA communications Part 1: Background, policies and test plan,” Amer. Gas Assoc, 2005.
[10]“Cryptographic protection of SCADA communications; Part 2: retrofit link encryption for asynchronous serial communications,” American Gas Assoc., 2005.
[11]行政院國家資通安全會報 , 國家資通安全發展方案 (106 年至 109 年 ) , 中華民國 106 年 11月。
[12]K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, and A. Hahn, “Guide to Industrial Control Systems (ICS) Security,” NIST Special Publication 800-82 Revision 2, 2015.
[13]M. Eldefrawy, “Modbus Authentication Protocol for Secure SCADA Systems,” Center of Excellence in information Assurance, 2016, https://www.youtube.com/watch?v=42m94qSgmfI
[14]J. Wiles, T. Claypoole, P. Drake, P. Henry, L. Johnson, S. Lowther, G. Miles, M. Tobias, and J. Windle, “Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure,” 2008.
[15]J. Graham and S. Patel, “Security Considerations in SCADA Communication Protocols,” Intelligent Systems Research Laboratory Technical Report TR-ISRL- 04-01, 2004.
[16]“Substations Committee of the IEEE Power Engineering Society,” 1379-2000-IEEE Recommended Practice for Data Communications Between Remote Terminal Units and Intelligent Electronic Devices in a Substation, 2001.
[17]G. Cagalaban, Y. So, and S. Kim, “SCADA Network Insecurity: Securing Critical Infrastructures through SCADA Security Exploitation,” 2009.
[18]B. Drury, “Control Techniques Drives and Controls Handbook,” Institution of Engineering and Technology, 2009.
[19]B. Zhu, A. Joseph, and S. Sastry, “A Taxonomy of Cyber Attacks on SCADA Systems,” International Conference on Internet of Things and 4th International Conference on Cyber, Physical, and Social Computing, pp. 380-388, 2011.
[20]M. Drahansky and M. Balitanas, “Cipher for Internet-based Supervisory Control and Data Acquisition Architecture,” Journal of Security Engineering, pp. 337-348, 2011.
[21]J. Rrushi, “SCADA Intrusion Prevention System”, 2006.
[22]R. Chahar, G. Datta, and N. Rajpal, “Design of a New Security Protocol,” International Conference on Computational Intelligence and Multimedia Applications, pp. 132-134, 2007.
[23]L. Pietre-Cambacedes and P. Sitbon, “Cryptographic key management for SCADA systems—Issues and perspectives,” in Proc. Int. Conf. Information Security and Assurance, 2008.
[24]D. Choi, K. Hakman, D. Won, and S. Kim, “Advanced Key-Management Architecture for Secure SCADA Communications,” Power Delivery, IEEE Transactions on, vol. 24, pp. 1154-1163, 2009.
[25]A. Rezai, P. Keshavarzi, and Z. Moravej, “A new key management scheme for SCADA network,” Proc. 2nd int. Symp. Comput. Sci. Eng., Aydin, Turkey, pp. 383–388, 2011.
[26]C. Kumar, G. Jose, C. Sajeev, and C. Suyambulingom, “Safety Measures Against Man-In-The-Middle Attack In Key Exchange,” 2006-2012 Asian Research Publishing Network (ARPN), VOL. 7, NO. 2, pp. 243-246, 2012.
[27]R. Dawson, C. Boyd, E. Dawson, and J. Nieto, “SKMA – A Key Management Architecture for SCADA Systems,” Information Security Institute Queensland University of Technology, 2006.
[28]E. Ramaraj, S. Karthikeyan, and M. Hemalatha, “A Design of Security Protocol using Hybrid Encryption Technique (AES and RSA),” International Journal of The Computer, the Internet and Management Vol. 17, No.1, pp. 78-86, 2009.
[29]A. Ebrahimi, F. Koropi, and H. Naji, “Increasing the security of SCADA systems using key management and hyper elliptic curve cryptography,” Proc. 9th Symp. Adv. Sci. Tech., Mashhad, pp. 17–24, 2014.
[30]D. Choi, H. Jeong, D. Won, and S. Kim, “Hybrid Key Management Architecture for Robust SCADA Systems,” Journal of Information Science and Engineering, Vol. 29, pp. 197-215, 2011.
[31]Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton, and G. Tsudik, “Secure group communication using robust contributory key agreement,” IEEE Transactions on Parallel and Distributed Systems, Vol. 15, pp. 468-480, 2004.
[32]S. Mittra, “Iolus: A Framework for Scalable Secure Multicasting,” ACM SIGCOMM Computer Communication Review, 1997.
[33]R. Jiang, R. Lu, J. Luo, C. Lai, and X. Shen, “Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid,” Secur. Commun. Netw, pp.1026–1039, 2015.
[34]M. Shi, X. Shen, Y. Jiang, and C. Lin, “Self-healing group key distribution with time-limited node revocation for wireless sensor networks,” IEEE Wireless Communications, pp.38-46, 2007.
[35]T. Pramod and N. Sunithaa, “Polynomial Based Scheme for Secure SCADA Operations,” Procedia Technology, Vol. 21, pp. 474-481, 2015.
[36]A. Rezai, P. Keshavarzi, and Z. Moravej, “Advance Hybrid Key Management Architecture for SCADA Network Security,” 2016. Secur. Commun. Netw, Vol 9, Issue17, 2016.
[37]S. Hong, G. Ahn, and W. XU, “Access control management for SCADA systems,” IEICE Transactions on Information and Systems, E91-D(10), pp.2449-2457, 2008.
[38]J. Schreiver, “Role based access control and authentication for SCADA field devices using a dual Bloom filter and challenge response,” Electronic Theses and Dissertations, 2012.
[39]M. Nasr and A. Varjani, “An alarm based access control model for SCADA system,” Smart Grid Conference (SGC 2015), pp.145-151, 2015.
[40]徐翊城,SCADA系統安全調查,國立中正大學通訊資訊數位學習碩士,2012。[41]陳林輝,SCADA 系統網路弱點偵測之研究,國防大學理工學院電子工程碩士,2015。[42]周定進,東台灣水力發電廠SCADA系統之研究,國立東華大學電機工程學系碩士,2008。[43]康渼松,台電負載特性之研究及其對電力系統運轉之影響,國立中山大學電機工程學系研究所博士,2001。[44]趙億裕,風力發電系統遠端監控平台設計與實現,國立高雄應用科技大學電機工程系碩士,2008。[45]林家宏,電力系統適應性故障診斷及電力品質偵測之研究,國立中山大學電機工程學系研究所博士,2004。[46]孫政治,應用人工智慧於變電所自動化故障診斷,國立中山大學電機工程學系研究所碩士,2002。[47]王儒生,陣列式感測架構應用於消防即時監控系統之研究,國立海洋大學機械與輪機工程學系碩士,2002。[48]高信豪,熱環境模式應用於水簾式畜舍環控管理系統之研究,國立中興大學農業機械工程學系碩士,2000。[49]吳東馨,水產養殖用自動化監控系統之研製,國立臺北科技大學自動化科技研究所碩士,2010。[50]賴嘉祥,資料採集與監控系統SCADA於水產養殖之應用,國立虎尾科技大學機械與機電工程研究所碩士,2014。