J. Weiss, Protecting industrial control systems from electronic threats, 2010.

S. Mclaughlin, Securing Control Systems from the Inside: A Case for Mediating Physical Behaviors, IEEE Security & Privacy, vol.11, issue.4, pp.82-84, 2013.
DOI : 10.1109/MSP.2013.96

R. Langner, Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/MSP.2011.67

B. Miller and D. Rowe, A survey SCADA of and critical infrastructure incidents, Proceedings of the 1st Annual conference on Research in information technology, RIIT '12, pp.51-56, 2012.
DOI : 10.1145/2380790.2380805

E. J. Hary and A. Waxman, Electric Grid Vul- nerability: Industry Responses Reveal Security Gaps, 2013.

I. Fovino, A. Carcano, M. Masera, and A. Trombetta, Design and Implementation of a Secure Modbus Protocol, Critical Infrastructure Protection III, ser. IFIP Advances in Information and Communication Technology, 2009.
DOI : 10.1145/359340.359342

K. A. Stouffer, J. A. Falco, and K. A. Scarfone, Sp 800-82. guide to industrial control systems (ics) security: Supervisory control and data acquisition (scada) systems, distributed control systems (dcs), and other control system configurations such as programmable logic controllers (plc), 2011.

Z. Durumeric, E. Wustrow, and J. A. Halderman, Zmap: Fast internetwide scanning and its security applications, USENIX Security Symposium

R. Graham, MASSCAN: Mass IP port scanner, accessed on 07, 2016.

M. De-vivo, E. Carrasco, G. Isern, and G. O. De-vivo, A review of port scanning techniques, ACM SIGCOMM Computer Communication Review, vol.29, issue.2, pp.41-48, 1999.
DOI : 10.1145/505733.505737

G. F. Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Insecure, 2009.

N. Provos, P. Honeyman, and P. Honeyman, ScanSSH -Scanning the Internet for SSH Servers, Proceedings of The 15th USENIX Systems Administration Conference, pp.25-30, 2001.

P. Eckersley, J. B. For, and . Ssliverse, An Observatory for the SSLiverse, 2010.

D. Leonard and D. Loguinov, Demystifying Internet-Wide Service Discovery, IEEE/ACM Transactions on Networking, vol.21, issue.6, pp.1760-1773, 2013.
DOI : 10.1109/TNET.2012.2231434

A. Dainotti, A. King, K. Claffy, F. Papale, and A. Pescapé, Analysis of a "/0" stealth scan from a botnet, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, pp.341-354, 2015.
DOI : 10.1145/2398776.2398778

R. Mitchell and I. Chen, A survey of intrusion detection techniques for cyber-physical systems, ACM Computing Surveys, vol.46, issue.4, pp.1-5529, 2014.
DOI : 10.1145/2542049

F. Schuster, A. Paul, and H. König, Towards Learning Normality for Anomaly Detection in Industrial Control Networks, Conference on Autonomous Infrastructure, Management, and Security (AIMS, 2013.
DOI : 10.1007/978-3-642-38998-6_8

URL : https://hal.archives-ouvertes.fr/hal-01489971

H. Lin, A. Slagell, Z. Kalbarczyk, P. W. Sauer, and R. K. Iyer, Semantic security analysis of scada networks to detect malicious control commands in power grids, Smart Energy Grid Security (SEGS), ser. SEGS. ACM, 2013.

A. Hahn, B. Kregel, M. Govindarasu, J. Fitzpatrick, R. Adnan et al., Development of the PowerCyber SCADA security testbed, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '10, 2010.
DOI : 10.1145/1852666.1852690

A. Carcano, I. Fovino, M. Masera, and A. Trombetta, State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept, Critical Information Infrastructures Security, ser. Lecture Notes in Computer Science, 2010.
DOI : 10.1007/978-3-642-14379-3_12

E. P. Leverett, Quantitatively assessing and visualising industrial system attack surfaces, 2011.

Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman, A Search Engine Backed by Internet-Wide Scanning, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015.
DOI : 10.1145/2810103.2813703