J. Beaver, R. Borges-hink, and M. Buckner, An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications, 2013 12th International Conference on Machine Learning and Applications, pp.54-59, 2013.
DOI : 10.1109/ICMLA.2013.105

B. Genge, C. Siaterlis, I. N. Fovino, and M. Masera, A cyber-physical experimentation environment for the security analysis of networked industrial control systems, Computers & Electrical Engineering, vol.38, issue.5, pp.1146-1161, 2012.
DOI : 10.1016/j.compeleceng.2012.06.015

J. Hutchinson, Vertebrate flight, University of California Museum of Paleontology, 1996.

W. Mahoney and R. Gandhi, An integrated framework for control system simulation and regulatory compliance monitoring, International Journal of Critical Infrastructure Protection, vol.4, issue.1, pp.41-53, 2011.
DOI : 10.1016/j.ijcip.2011.03.002

R. Mcgrew, Vulnerability Analysis Case Studies of Control System Human-Machine Interfaces, 2012.

T. Morris, R. Vaughn, and Y. Dandass, A testbed for SCADA control system cybersecurity research and pedagogy, Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '11, 2011.
DOI : 10.1145/2179298.2179327

B. Obama, Executive Order 13636: Improving Critical Infrastructure Cybersecurity , The White House

B. Reaves and T. Morris, An open virtual testbed for industrial control system security research, International Journal of Information Security, vol.I, issue.4, pp.215-229, 2012.
DOI : 10.1007/s10207-012-0164-7