R. Bodenheim, J. Butts, S. Dunlap, and B. Mullins, Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices, International Journal of Critical Infrastructure Protection, vol.7, issue.2, pp.114-123, 2014.
DOI : 10.1016/j.ijcip.2014.03.001

E. Byres, Project SHINE: 1,000,000 Internet-Connected SCADA and ICS Systems and Counting, 2013.

M. Geilen and T. Basten, Requirements on the Execution of Kahn Process Networks, Proceedings of the Twelfth European Conference on Programming, pp.319-334, 2003.
DOI : 10.1007/3-540-36575-3_22

N. Hadjsaid, C. Tranchita, B. Rozel, M. Viziteu, and R. Caire, Modeling cyber and physical interdependencies - Application in ICT and power grids, 2009 IEEE/PES Power Systems Conference and Exposition, 2009.
DOI : 10.1109/PSCE.2009.4840183

URL : https://hal.archives-ouvertes.fr/hal-00488874

G. Kahn, The semantics of a simple language for parallel programming, Proceedings of the IFIP Congress, pp.471-475, 1974.

E. Knapp and J. Langill, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems, 2015.

E. Lee and T. Parks, Dataflow process networks, Dataflow process networks, pp.773-801, 1995.
DOI : 10.1109/5.381846

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.2539

Y. Liang and R. Campbell, Understanding and Simulating the IEC 61850 Standard, 2008.

S. Liu, S. Mashayekh, D. Kundur, T. Zourntos, and K. Butler-purry, A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid, IEEE Transactions on Emerging Topics in Computing, vol.1, issue.2, pp.273-285, 2014.
DOI : 10.1109/TETC.2013.2296440

P. Maynard, K. Mclaughlin, and B. Haberler, Towards understanding manin-the-middle attacks on IEC 60870-5-104 SCADA networks, Proceedings of the Second International Symposium on ICS and SCADA Cyber Security Research, pp.30-42, 2014.

J. Mcclean, C. Stull, C. Farrar, and D. Mascarenas, A preliminary cyberphysical security assessment of the Robot Operating System, Proceedings of the SPIE, 2013.

V. Pothamsetty and M. Franz, Building Honeypots for Industrial Networks, Critical Infrastructure Assurance Group, Cisco Systems, 2005.

M. Rashid, S. Yussof, Y. Yusoff, and R. Ismail, A review of security attacks on IEC 61850 substation automation system networks, Proceedings of the International Conference on Information Technology and Multimedia, pp.5-10, 2014.

E. Staff, H. Markey, and . Waxman, Electric Grid Vulnerability: Industry Responses Reveal Security Gaps, U.S. House of Representatives

A. Timorin, SCADA deep inside, presented at the Balkan Computer Congress, 2014.

S. Wade and . Honeynets, The Attractiveness of Honeypots as Critical Infrastructure Security Tools for the Detection and Analysis of Advanced Threats, 2011.

K. Wilhoit, Who's Really Attacking Your ICS Equipment? Research Paper , Trend Micro, 2013.