Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011. ,
DOI : 10.1109/MSP.2011.67
Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS), 2008 IEEE Conference on Technologies for Homeland Security, 2008. ,
DOI : 10.1109/THS.2008.4534498
Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.312435-2463, 1999. ,
DOI : 10.1016/S1389-1286(99)00112-7
Open source ids / ips / nsm engine, 2016. ,
Snort: Open source network intrusion prevention system. https://www.snort.org, 2016. ,
Dispositif d'échange sécurisé d'informations sans interconnexion réseau Agence nationale de la sécurité des systèmes d'information, 2010. ,
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
What can you verify and enforce at runtime?, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, 2010. ,
DOI : 10.1007/s10009-011-0196-8
URL : https://hal.archives-ouvertes.fr/hal-00497350
A model-based approach to self-protection in scada systems, IWFC'14, 2014. ,
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures, ICHAISPT'15, 2015. ,
DOI : 10.1007/978-3-319-20376-8_60
On safety properties and their monitoring, Scientific Annals of Computer Science, vol.22, issue.2, pp.327-365, 2012. ,
First experiences using XACML for access control in distributed systems, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, 2003. ,
DOI : 10.1145/968559.968563