1. Lea, J.F. Jr, Rowlan, L.: Gas Well Deliquification. Gulf Professional Publishing, UK (2019)
2. Kennedy, J.L.: Oil and Gas Pipeline Fundamentals. Pennwell Books, USA (1993)
3. Belqruch, A., Maach, A.: Scada security using SSH honeypot. In: Proceedings of the 2nd International Conference on Networking, Information Systems and Security, p. 2. ACM (2019)
4. Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., Valdes, A.: Using model-based intrusion detection for scada networks. In: Proceedings of the SCADA Security Scientific Symposium, vol. 46, pp. 1–12. Citeseer (2007)
5. Yang, D.,Usynin, A.,Hines, J.W.: Anomaly-based intrusion detection for scada systems. In: 5th International Topical Meeting on Nuclear Plant Instrumentation, Control and HumanMachine Interface Technologies (NPIC and HMIT 05), pp. 12–16 (2006)