R. Langner, Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/MSP.2011.67

M. Robert, . Lee, J. Michael, T. Assante, and . Conway, German steel mill cyber attack, Industrial Control Systems, vol.30, 2014.

M. Robert, . Lee, J. Michael, T. Assante, and . Conway, Analysis of the cyber attack on the ukrainian power grid, SANS Industrial Control Systems, 2016.

M. Puys, M. Potet, and P. Lafourcade, Formal Analysis of Security Properties on the OPC-UA SCADA Protocol, Computer Safety, Reliability, and Security -35th International Conference Proceedings, pp.67-75, 2016.
DOI : 10.1007/978-3-540-68899-0

URL : https://hal.archives-ouvertes.fr/hal-01366059

J. Dreier, M. Puys, M. Potet, P. Lafourcade, and J. Roch, Formally Verifying Flow Integrity Properties in Industrial Systems, SECRYPT 2017 -14th International Conference on Security and Cryptography, p.12, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01527913

J. Eric, M. Byres, D. Franz, and . Miller, The use of attack trees in assessing vulnerabilities in scada systems, Proceedings of the international infrastructure survivability workshop, 2004.

Y. Cherdantseva, P. Burnap, A. Blyth, P. Eden, K. Jones et al., A review of cyber security risk assessment methods for SCADA systems, Computers & Security, vol.56, pp.1-27, 2015.
DOI : 10.1016/j.cose.2015.09.009

L. Piètre-cambacédès and M. Bouissou, Cross-fertilization between safety and security engineering, Reliability Engineering & System Safety, vol.110, pp.110-126, 2013.
DOI : 10.1016/j.ress.2012.09.011

S. Kriaa, L. Pietre-cambacedes, M. Bouissou, and Y. Halgand, A survey of approaches combining safety and security for industrial control systems, Reliability Engineering & System Safety, vol.139, pp.156-178, 2015.
DOI : 10.1016/j.ress.2015.02.008

URL : https://hal.archives-ouvertes.fr/hal-01222958

S. Kriaa, M. Bouissou, and L. Piètre-cambacédès, Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.1-8, 2012.
DOI : 10.1109/CRISIS.2012.6378942

URL : https://hal.archives-ouvertes.fr/hal-01222960

L. Piètre-cambacédès, Y. Deflesselle, and M. Bouissou, Security Modeling with BDMP: From Theory to Implementation, 2011 Conference on Network and Information Systems Security, pp.1-8, 2011.
DOI : 10.1109/SAR-SSI.2011.5931382

S. Kriaa, Y. Bouissou, and . Laarouchi, A Model Based Approach For SCADA Safety And Security Joint Modelling: S-Cube, 10th IET System Safety and Cyber-Security Conference 2015, 2015.
DOI : 10.1049/cp.2015.0293

M. Rocchetto and N. O. Tippenhauer, Towards Formal Security Analysis of Industrial Control Systems, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, pp.114-126, 2017.
DOI : 10.1038/474142a

M. Turuani, The CL-Atse Protocol Analyser, 17th International Conference on Term Rewriting and Applications -RTA, pp.277-286, 2006.
DOI : 10.1007/11805618_21

URL : https://hal.archives-ouvertes.fr/inria-00103573

M. Rocchetto and N. O. Tippenhauer, CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions, International Conference on Formal Engineering Methods, pp.175-192, 2016.
DOI : 10.1038/474142a

G. Behrmann, R. David, and K. G. Larsen, A Tutorial on Uppaal, pp.200-236, 2004.
DOI : 10.1007/978-3-540-30080-9_7

M. Puys, M. Potet, and J. Roch, Génération systématique de scénarios d'attaques contre des systèmes industriels, Approches Formelles dans l'Assistance au Développement de Logiciels, 2016.

E. Clarke and E. Emerson, Design and synthesis of synchronization skeletons using branching time temporal logic. Logics of programs, pp.52-71, 1982.

D. Dolev and A. C. Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1981.

I. Cervesato, The dolev-yao intruder is the most powerful attacker, 16th Annual Symposium on Logic in Computer Science?LICS, 2001.