DoD (2010) ‘Department of Defense Modeling and
Simulation Best Practices Guide’. US Department of
Defense.
Fogg, B. J. and Tseng, H. (1999) ‘The elements of computer
credibility’, in CHI 99 Human Factors in Computing
Systems Conference. Pittsburgh, PA: ACM Press, pp.
80–87.
Fovino, I. N. et al. (2010) ‘An experimental platform for
assessing SCADA vulnerabilities and countermeasures
in power plants’, in 3rd International Conference on
Human System Interaction, HSI’2010 - Conference
Proceedings. Rzeszow, Poland: IEEE, pp. 679–686.
Frank, M., Leitner, M. and Pahi, T. (2018) ‘Design
Considerations for Cyber Security Testbeds: A Case
Study on a Cyber Security Testbed for Education’, in
15th International Conference on Dependable,
Autonomic and Secure Computing, IEEE 15th
International Conference on Pervasive Intelligence and
Computing, IEEE 3rd International Conference on Big
Data Intelligence and Compu. Orlando, FL, USA:
IEEE, pp. 38–46.
Gao, H. et al. (2014) ‘An Industrial Control System Testbed
Based on Emulation, Physical Devices and Simulation’,
in Butts, J. and Shenoi, S. (eds) IFIP Advances in
Information and Communication Technology. Critical
I. Arlington, Virginia, USA: Springer Berlin
Heidelberg, pp. 79–91.
Gardiner, J. et al. (2019) ‘Oops I Did it Again : Further
Adventures in the Land of ICS Security Testbeds’, in
Proceedings of the 2019 Workshop on Cyber-Physical
Systems Security and Privacy. London, UK: ACM.
Government Office for Science (2018) Computational
Modelling: Technical Futures. London.
Grant, M. J. and Booth, A. (2009) ‘A typology of reviews:
An analysis of 14 review types and associated
methodologies’, Health Information and Libraries
Journal, 26, pp. 91–108.
Green, B. et al. (2017) ‘Pains, Gains and PLCs: Ten
Lessons from Building an Industrial Control Systems
Testbed for Security Research’, in 10th USENIX
Workshop on Cyber Security Experimentation and Test
(CSET ’17). Vancouver, Canada: USENIX Association
Berkeley, CA, USA, pp. 1–8.
GSE Systems (2017) Fidelity Matters: What ‘High-fidelity’
Really Means, Simulation & Training Blog.
Hahn, A. et al. (2013) ‘Cyber-physical security testbeds:
Architecture, Application, and Evaluation for Smart
Grid’, IEEE Transactions on Smart Grid, 4(2), pp. 847–
855.
Hilligoss, B. and Rieh, S. Y. (2008) ‘Developing a unifying
framework of credibility assessment: Construct,
heuristics, and interaction in context’, Information
Processing and Management. Elservier
(ScienceDirect), 44(4), pp. 1467–1484.
Holm, H. et al. (2015) ‘A Survey of Industrial Control
System Testbeds’, in In: Buchegger S., Dam M. (eds)
Secure IT Systems. Lecture Notes in Computer Science.
Switzerland: Springer, Cham, pp. 11–26.
Holm, H., Ekstedt, M. and Andersson, D. (2012) ‘Empirical
analysis of system-level vulnerability metrics through
actual attacks’, IEEE Transactions on Dependable and
Secure Computing, 9(6), pp. 825–837.
Kavak, H. et al. (2016) ‘A Characterization of
Cybersecurity Simulation Scenarios’, in 19th
Communications and Networking Simulation
Symposium (CNS’16). CA, USA: Society for Modelling
& Simulation International (SCS) & ACM, pp. 1–8.
Knowles, W. et al. (2015) ‘A survey of cyber security
management in industrial control systems’,
International Journal of Critical Infrastructure
Protection. Elsevier, 9, pp. 52–80.
Koutsandria, G. et al. (2015) ‘A Real-Time Testbed
Environment for Cyber-Physical Security on the Power
Grid’, in First ACM Workshop on Cyber-Physical
Systems-Security and/or PrivaCy - CPS-SPC ’15.
Denver, CO, USA: ACM, pp. 67–78.
Law, A. M. (2009) ‘How to build valid and credible
simulation models’, in Rossetti, M. D. et al. (eds) 2009
Winter Simulation Conference (WSC). Austin, TX,
USA: IEEE, pp. 24–33.
Lu, T. et al. (2014) ‘Cyber-Physical Security for Industrial
Control Systems Based on Wireless Sensor Networks’,
Downloads.Hindawi.Com, 2014.
McDonald, M. J. and Richardson, B. T. (2009) Position
Paper : Modeling and Simulation for Process Control
System Cyber Security Research , Development and
Applications, Center for Information Management,
Integration and Connectivity - Position Papers.
McLaughlin, S. et al. (2016) ‘The Cybersecurity Landscape
in Industrial Control Systems’, Proceedings of the
IEEE, 104(5), pp. 1039–1057.
McLean, C. et al. (2011) ‘Modeling and Simulation of
Critical Infrastructure Systems for Homeland Security
Applications’, NIST Special Publications. National
Institute of Standards and Technology, p. 86.
Pahi, T., Leitner, M. and Skopik, F. (2017) ‘Data
Exploitation at Large: Your Way to Adequate Cyber
Common Operating Pictures’, in 16th European
Conference on Cyber Warefare and Security. Reading,
Berkshire, UK: Academic Conferences and Publishing
International Ltd, pp. 307–315.
Patterson, E. A. and Whelan, M. P. (2017) ‘A framework to
establish credibility of computational models in
biology’, Progress in Biophysics and Molecular
Biology. Elsevier Ltd, 129, pp. 13–19.
Sadeghi, A.-R., Wachsmann, C. and Waidner, M. (2015)
‘Security and Privacy Challenges in Industrial Internet
of Things’, in 52nd Annual Design Automation
Conference on - DAC ’15. San Francisco, CA, USA:
ACM, pp. 1–6.
Salisbury, L. (2009) ‘Web of Science and Scopus: A
comparative review of content and searching
capabilities’, The Charleston Advisor, July, pp. 5–19.
Salunkhe, O. et al.
(2018) ‘Cyber-Physical Production
Testbed: Literature Review and Concept
Development’, Procedia Manufacturing. Elsevier
B.V., 25, pp. 2–9.
Schruben, L. W. (1980) ‘Establishing the credibility of
simulations’, Simulation. Simulation Councils Inc.,
34(3), pp. 101–105.