A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Fovino et al., A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems, IEEE Transactions on Industrial Informatics, vol.7, issue.2, pp.179-186, 2011.
DOI : 10.1109/TII.2010.2099234

S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner et al., Using model-based intrusion detection for SCADA networks, Proceedings of the SCADA Security Scientific Symposium, 2007.

W. Gao, Cyber Threats, Attacks and Intrusion Detection in Supervisory Control and Data Acquisition Networks, 2014.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

O. Linda, M. Manic, and M. Mcqueen, Improving control system cyberstate awareness using known secure sensor measurements, Proceedings of the Seventh International Conference on Critical Information Infrastructures Security, pp.46-58, 2012.
DOI : 10.1007/978-3-642-41485-5_5

O. Linda, T. Vollmer, and M. Manic, Neural Network based Intrusion Detection System for critical infrastructures, 2009 International Joint Conference on Neural Networks, pp.1827-1834, 2009.
DOI : 10.1109/IJCNN.2009.5178592

T. Morris, A. Srivastava, B. Reaves, W. Gao, K. Pavurapu et al., A control system testbed to validate critical infrastructure protection concepts, International Journal of Critical Infrastructure Protection, vol.4, issue.2, pp.88-103, 2011.
DOI : 10.1016/j.ijcip.2011.06.005

P. Oman and M. Phillips, Intrusion Detection and Event Monitoring in SCADA Networks, pp.161-173, 2008.
DOI : 10.1007/978-0-387-75462-8_12

K. Poulsen, Slammer worm crashed Ohio nuke plant network, Security- Focus, Symantec, Mountain View, California (www.securityfocus, 2003.

J. Rrushi and K. Kang, Detecting Anomalies in Process Control Networks, pp.151-165, 2009.
DOI : 10.1145/235025.235031

J. Slay and M. Miller, Lessons Learned from the Maroochy Water Breach, pp.73-82, 2008.
DOI : 10.1007/978-0-387-75462-8_6

C. Ten, J. Hong, and C. Liu, Anomaly Detection for Cybersecurity of the Substations, IEEE Transactions on Smart Grid, vol.2, issue.4, pp.865-873, 2011.
DOI : 10.1109/TSG.2011.2159406

A. Valdes and S. Cheung, Communication pattern anomaly detection in process control systems, 2009 IEEE Conference on Technologies for Homeland Security, pp.22-29, 2009.
DOI : 10.1109/THS.2009.5168010

D. Yang, A. Usynin, and J. Hines, Anomaly-based intrusion detection for SCADA systems, presented at the IAEA Technical Meeting on Cyber Security of Nuclear Power Plant Instrumentation and Control and Information Systems, 2006.

Y. Zhang, L. Wang, W. Sun, R. Green, and M. Alam, Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids, IEEE Transactions on Smart Grid, vol.2, issue.4, pp.796-808, 2011.
DOI : 10.1109/TSG.2011.2159818