Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011. ,
DOI : 10.1109/MSP.2011.67
Guide to industrial control systems (ICS) security, NIST special publication, vol.800, issue.82, pp.16-16, 2011. ,
Security issues in SCADA networks, Computers & Security, vol.25, issue.7, pp.498-506, 2006. ,
Improving the cyber security of SCADA communication networks, Commun. ACM, vol.52, issue.7, pp.139-142, 2009. ,
Practical modern SCADA protocols: DNP3, 60870.5 and related systems, Newnes, 2004. ,
Security for Industrial Communication Systems, Proceedings of the IEEE, vol.93, issue.6, pp.1152-1177, 2005. ,
DOI : 10.1109/JPROC.2005.849714
The Study of Security Issues for the Industrial Control Systems Communication Protocols, Proceedings of the 2015 Joint International Mechanical, Electronic and Information Technology Conference, 2015. ,
DOI : 10.2991/jimet-15.2015.129
Analysis of SCADA security models, International Management Review, vol.3, issue.2, p.68, 2007. ,
Design and Implementation of a Secure Modbus Protocol, IFIP AICT'09, 2009. ,
DOI : 10.1145/359340.359342
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol, 2013 Third International Conference on Communications and Information Technology (ICCIT), 2013. ,
DOI : 10.1109/ICCITechnology.2013.6579545
Correctness proofs for SCADA communication protocols, WM-SCI'05, 2005. ,
An On-the-Fly Model-Checker for Security Protocol Analysis, ESORICS'03, 2003. ,
DOI : 10.1007/978-3-540-39650-5_15
SPEAR II ? the security protocol engineering and analysis resource, 1999. ,
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties, FPS'15, 2015. ,
DOI : 10.1007/978-3-319-30303-1_9
URL : https://hal.archives-ouvertes.fr/hal-01306395
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930138
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1981. ,
The transport layer security (TLS) protocol, version 1.2. IETF RFC 5246, 2008. ,
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, TACAS'96, 1996. ,
DOI : 10.1007/3-540-61042-1_43
Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering, vol.22, issue.1, p.6, 1996. ,
DOI : 10.1109/32.481513
An introduction to security API analysis. In Foundations of security analysis and design VI, pp.35-65, 2011. ,