R. Langner, Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/MSP.2011.67

K. Stouffer, J. Falco, and S. Karen, Guide to industrial control systems (ICS) security, NIST special publication, vol.800, issue.82, pp.16-16, 2011.

M. Vinay, S. A. Igure, R. D. Laughter, and . Williams, Security issues in SCADA networks, Computers & Security, vol.25, issue.7, pp.498-506, 2006.

C. Sandip, G. D. Patel, J. H. Bhatt, and . Graham, Improving the cyber security of SCADA communication networks, Commun. ACM, vol.52, issue.7, pp.139-142, 2009.

R. Gordon, D. Clarke, E. Reynders, and . Wright, Practical modern SCADA protocols: DNP3, 60870.5 and related systems, Newnes, 2004.

D. Dzung, M. Naedele, T. P. Hoff, and M. Crevatin, Security for Industrial Communication Systems, Proceedings of the IEEE, vol.93, issue.6, pp.1152-1177, 2005.
DOI : 10.1109/JPROC.2005.849714

Q. Wanying, W. Weimin, Z. Surong, and Z. Yan, The Study of Security Issues for the Industrial Control Systems Communication Protocols, Proceedings of the 2015 Joint International Mechanical, Electronic and Information Technology Conference, 2015.
DOI : 10.2991/jimet-15.2015.129

C. Sandip, Y. Patel, and . Yu, Analysis of SCADA security models, International Management Review, vol.3, issue.2, p.68, 2007.

I. Fovino, A. Carcano, M. Masera, and A. Trombetta, Design and Implementation of a Secure Modbus Protocol, IFIP AICT'09, 2009.
DOI : 10.1145/359340.359342

G. Hayes and K. El-khatib, Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol, 2013 Third International Conference on Communications and Information Technology (ICCIT), 2013.
DOI : 10.1109/ICCITechnology.2013.6579545

J. Graham and S. Patel, Correctness proofs for SCADA communication protocols, WM-SCI'05, 2005.

D. Basin, S. Mödersheim, and L. Viganò, An On-the-Fly Model-Checker for Security Protocol Analysis, ESORICS'03, 2003.
DOI : 10.1007/978-3-540-39650-5_15

E. Saul and A. Hutchison, SPEAR II ? the security protocol engineering and analysis resource, 1999.

P. Lafourcade and M. Puys, Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties, FPS'15, 2015.
DOI : 10.1007/978-3-319-30303-1_9

URL : https://hal.archives-ouvertes.fr/hal-01306395

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930138

D. Dolev and A. C. Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1981.

T. Dierks and E. Rescorla, The transport layer security (TLS) protocol, version 1.2. IETF RFC 5246, 2008.

G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, TACAS'96, 1996.
DOI : 10.1007/3-540-61042-1_43

M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering, vol.22, issue.1, p.6, 1996.
DOI : 10.1109/32.481513

R. Focardi, L. Flaminia, G. Luccio, and . Steel, An introduction to security API analysis. In Foundations of security analysis and design VI, pp.35-65, 2011.