?id= documentation:agent) ,
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol.40, issue.4, pp.419-428, 2010. ,
DOI : 10.1109/TSMCC.2010.2045373
A Platform for Disaster Response Planning with Interdependency Simulation Functionality, pp.183-197, 2013. ,
DOI : 10.1007/978-3-642-45330-4_13
URL : https://hal.archives-ouvertes.fr/hal-01456885
Design of wireless sensor network in SCADA system for wind power plant, Proceedings of the IEEE International Conference on Automation and Logistics, pp.3023-3027, 2008. ,
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards, Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards, pp.1655-1695, 2007. ,
DOI : 10.1016/j.comcom.2006.12.020
Enhancing SIEM Technology to Protect Critical Infrastructures, Proceedings of the Seventh International Workshop on Critical Information Infrastructure Security, pp.10-21, 2010. ,
DOI : 10.1007/978-3-642-41485-5_2
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study, Proceedings of the Thirtieth International Conference on Computer Safety, Reliability and Security, pp.199-212, 2011. ,
DOI : 10.1016/j.advengsoft.2008.10.009
The Intrusion Detection Message Exchange Format (IDMEF), RFC 4765, 2007. ,
Modelling critical infrastructure via a mixed holistic reductionistic approach, International Journal of Critical Infrastructures, vol.5, issue.1/2, pp.86-99, 2009. ,
DOI : 10.1504/IJCIS.2009.022851
Assessing the Impact of Cyber Attacks on Interdependent Physical Systems, Critical Infrastructure Protection VII, pp.215-227, 2013. ,
DOI : 10.1007/978-3-642-45330-4_15
URL : https://hal.archives-ouvertes.fr/hal-01456888
Taxonomy of SCADA systems security testbeds ,
Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks, pp.303-328, 2013. ,
DOI : 10.1007/978-3-642-36169-2_9
The state of the art in critical infrastructure protection: a framework for convergence, International Journal of Critical Infrastructures, vol.4, issue.3, pp.215-244, 2008. ,
DOI : 10.1504/IJCIS.2008.017438
Investigating Russia's biggest dam explosion: What went wrong, Popular Mechanics (www.popularmechanics.com/technology/en gineering, 2010. ,
Multisystem simulation: Analysis of critical infrastructures for disaster response, in Networks of Networks: The Last Frontier of Complexity, pp.255-277, 2014. ,
Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey, 2010 13th International Conference on Network-Based Information Systems, pp.313-320, 2010. ,
DOI : 10.1109/NBiS.2010.11
URL : https://hal.archives-ouvertes.fr/hal-00661831
Slammer worm crashed Ohio nuke plant network, Security Focus (www.securityfocus.com, 2003. ,
Prelude LML (www.prelude-ids.org/wiki/prelude, p.2013 ,
Home of SMC: The State Machine Compiler (smc.sourceforge. net), 2013. ,
Identifying, understanding, and analyzing critical infrastructure interdependencies, IEEE Control Systems Magazine, vol.21, issue.6, pp.11-25, 2001. ,
DOI : 10.1109/37.969131
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure??Protection, Information Security Technical Report, vol.12, issue.1, pp.24-31, 2007. ,
DOI : 10.1016/j.istr.2007.02.003
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology, Proceedings of the Thirty-First International Conference on Computer Safety, Reliability and Security, pp.222-234, 2012. ,
DOI : 10.1007/978-3-642-33675-1_20
Synthesis of Modeling and Simulation Methods on Critical Infrastructure Interdependencies Research, Sustainable and Resilient Critical Infrastructure Systems, pp.1-51, 2010. ,
DOI : 10.1007/978-3-642-11405-2_1
A multi-layer Criticality Assessment methodology based on interdependencies, Computers & Security, vol.29, issue.6, pp.643-658, 2010. ,
DOI : 10.1016/j.cose.2010.02.003