O. Alienvault and . Sensor, ?id= documentation:agent)

C. Alcaraz and J. Lopez, A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol.40, issue.4, pp.419-428, 2010.
DOI : 10.1109/TSMCC.2010.2045373

A. Alsubaie, A. Di-pietro, J. Marti, P. Kini, T. Lin et al., A Platform for Disaster Response Planning with Interdependency Simulation Functionality, pp.183-197, 2013.
DOI : 10.1007/978-3-642-45330-4_13

URL : https://hal.archives-ouvertes.fr/hal-01456885

X. Bai, X. Meng, Z. Du, M. Gong, and Z. Hu, Design of wireless sensor network in SCADA system for wind power plant, Proceedings of the IEEE International Conference on Automation and Logistics, pp.3023-3027, 2008.

P. Baronti, P. Pillai, V. Chook, S. Chessa, A. Gotta et al., Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards, Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards, pp.1655-1695, 2007.
DOI : 10.1016/j.comcom.2006.12.020

L. Coppolino, S. D. Antonio, V. Formicola, and L. Romano, Enhancing SIEM Technology to Protect Critical Infrastructures, Proceedings of the Seventh International Workshop on Critical Information Infrastructure Security, pp.10-21, 2010.
DOI : 10.1007/978-3-642-41485-5_2

L. Coppolino, S. D. Antonio, V. Formicola, and L. Romano, Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study, Proceedings of the Thirtieth International Conference on Computer Safety, Reliability and Security, pp.199-212, 2011.
DOI : 10.1016/j.advengsoft.2008.10.009

H. Debar, D. Curry, and B. Feinstein, The Intrusion Detection Message Exchange Format (IDMEF), RFC 4765, 2007.

S. De-porcellinis, S. Panzieri, and R. Setola, Modelling critical infrastructure via a mixed holistic reductionistic approach, International Journal of Critical Infrastructures, vol.5, issue.1/2, pp.86-99, 2009.
DOI : 10.1504/IJCIS.2009.022851

A. D. Pietro, C. Foglietta, S. Palmieri, and S. Panzieri, Assessing the Impact of Cyber Attacks on Interdependent Physical Systems, Critical Infrastructure Protection VII, pp.215-227, 2013.
DOI : 10.1007/978-3-642-45330-4_15

URL : https://hal.archives-ouvertes.fr/hal-01456888

A. , D. Pietro, and S. Panzieri, Taxonomy of SCADA systems security testbeds

Z. Dyka and P. Langendorfer, Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks, pp.303-328, 2013.
DOI : 10.1007/978-3-642-36169-2_9

A. Ghorbani and E. Bagheri, The state of the art in critical infrastructure protection: a framework for convergence, International Journal of Critical Infrastructures, vol.4, issue.3, pp.215-244, 2008.
DOI : 10.1504/IJCIS.2008.017438

J. Hasler, Investigating Russia's biggest dam explosion: What went wrong, Popular Mechanics (www.popularmechanics.com/technology/en gineering, 2010.

J. Marti, Multisystem simulation: Analysis of critical infrastructures for disaster response, in Networks of Networks: The Last Frontier of Complexity, pp.255-277, 2014.

D. Martins and H. Guyennet, Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey, 2010 13th International Conference on Network-Based Information Systems, pp.313-320, 2010.
DOI : 10.1109/NBiS.2010.11

URL : https://hal.archives-ouvertes.fr/hal-00661831

K. Poulsen, Slammer worm crashed Ohio nuke plant network, Security Focus (www.securityfocus.com, 2003.

. Prelude-ids, Prelude LML (www.prelude-ids.org/wiki/prelude, p.2013

C. Rapp, Home of SMC: The State Machine Compiler (smc.sourceforge. net), 2013.

S. Rinaldi, J. Peerenboom, and T. Kelly, Identifying, understanding, and analyzing critical infrastructure interdependencies, IEEE Control Systems Magazine, vol.21, issue.6, pp.11-25, 2001.
DOI : 10.1109/37.969131

R. Roman, C. Alcaraz, and J. Lopez, The role of Wireless Sensor Networks in the area of Critical Information Infrastructure??Protection, Information Security Technical Report, vol.12, issue.1, pp.24-31, 2007.
DOI : 10.1016/j.istr.2007.02.003

L. Romano, S. D. Antonio, V. Formicola, and L. Coppolino, Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology, Proceedings of the Thirty-First International Conference on Computer Safety, Reliability and Security, pp.222-234, 2012.
DOI : 10.1007/978-3-642-33675-1_20

G. Satumitra and L. Duenas-osorio, Synthesis of Modeling and Simulation Methods on Critical Infrastructure Interdependencies Research, Sustainable and Resilient Critical Infrastructure Systems, pp.1-51, 2010.
DOI : 10.1007/978-3-642-11405-2_1

M. Theoharidou, P. Kotzanikolaou, and D. Gritzalis, A multi-layer Criticality Assessment methodology based on interdependencies, Computers & Security, vol.29, issue.6, pp.643-658, 2010.
DOI : 10.1016/j.cose.2010.02.003