S. Conchon and J. Caire, Expression des besoins et identification des objectifs de résilience, 2015.

S. Kriaa, Y. Bouissou, and . Laarouchi, A Model Based Approach For SCADA Safety And Security Joint Modelling: S-Cube, 10th IET System Safety and Cyber-Security Conference 2015, 2015.
DOI : 10.1049/cp.2015.0293

R. Langner, Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/MSP.2011.67

B. Schneier, Attack trees. Dr. Dobb's journal, pp.21-29, 1999.

J. Theodore and . Williams, A Reference Model for Computer Integrated Manufacturing (CIM) : A Description from the Viewpoint of Industrial Automation : Prepared by CIM Reference Model Committee International Purdue Workshop on Industrial Computer Systems, 1991.