Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices, International Journal of Critical Infrastructure Protection, vol.7, issue.2, pp.114-123, 2014. ,
DOI : 10.1016/j.ijcip.2014.03.001
Project SHINE: 1,000,000 Internet-Connected SCADA and ICS Systems and Counting, 2013. ,
Requirements on the Execution of Kahn Process Networks, Proceedings of the Twelfth European Conference on Programming, pp.319-334, 2003. ,
DOI : 10.1007/3-540-36575-3_22
Modeling cyber and physical interdependencies - Application in ICT and power grids, 2009 IEEE/PES Power Systems Conference and Exposition, 2009. ,
DOI : 10.1109/PSCE.2009.4840183
URL : https://hal.archives-ouvertes.fr/hal-00488874
The semantics of a simple language for parallel programming, Proceedings of the IFIP Congress, pp.471-475, 1974. ,
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems, 2015. ,
Dataflow process networks, Dataflow process networks, pp.773-801, 1995. ,
DOI : 10.1109/5.381846
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.2539
Understanding and Simulating the IEC 61850 Standard, 2008. ,
A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid, IEEE Transactions on Emerging Topics in Computing, vol.1, issue.2, pp.273-285, 2014. ,
DOI : 10.1109/TETC.2013.2296440
Towards understanding manin-the-middle attacks on IEC 60870-5-104 SCADA networks, Proceedings of the Second International Symposium on ICS and SCADA Cyber Security Research, pp.30-42, 2014. ,
A preliminary cyberphysical security assessment of the Robot Operating System, Proceedings of the SPIE, 2013. ,
Building Honeypots for Industrial Networks, Critical Infrastructure Assurance Group, Cisco Systems, 2005. ,
A review of security attacks on IEC 61850 substation automation system networks, Proceedings of the International Conference on Information Technology and Multimedia, pp.5-10, 2014. ,
Electric Grid Vulnerability: Industry Responses Reveal Security Gaps, U.S. House of Representatives ,
SCADA deep inside, presented at the Balkan Computer Congress, 2014. ,
The Attractiveness of Honeypots as Critical Infrastructure Security Tools for the Detection and Analysis of Advanced Threats, 2011. ,
Who's Really Attacking Your ICS Equipment? Research Paper , Trend Micro, 2013. ,