R. Langner, Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/MSP.2011.67

J. Verba and M. Milvich, Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS), 2008 IEEE Conference on Technologies for Homeland Security, 2008.
DOI : 10.1109/THS.2008.4534498

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.312435-2463, 1999.
DOI : 10.1016/S1389-1286(99)00112-7

O. Suricata, Open source ids / ips / nsm engine, 2016.

S. Team, Snort: Open source network intrusion prevention system. https://www.snort.org, 2016.

E. Sinetics, Dispositif d'échange sécurisé d'informations sans interconnexion réseau Agence nationale de la sécurité des systèmes d'information, 2010.

B. Fred and . Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.

Y. Falcone, J. Fernandez, and L. Mounier, What can you verify and enforce at runtime?, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, 2010.
DOI : 10.1007/s10009-011-0196-8

URL : https://hal.archives-ouvertes.fr/hal-00497350

Q. Chen and S. Abdelwahed, A model-based approach to self-protection in scada systems, IWFC'14, 2014.

G. Stergiopoulos, M. Theocharidou, and D. Gritzalis, Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures, ICHAISPT'15, 2015.
DOI : 10.1007/978-3-319-20376-8_60

G. Ro¸suro¸su, On safety properties and their monitoring, Scientific Annals of Computer Science, vol.22, issue.2, pp.327-365, 2012.

M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah, First experiences using XACML for access control in distributed systems, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, 2003.
DOI : 10.1145/968559.968563