N. Collier, RePast: An extensible framework for agent simulation, Natural Resources and Environmental Issues, vol.8, issue.1 4, 2001.

D. Porcellinis, G. Oliva, S. Panzieri, and R. Setola, A holisticreductionistic approach for modeling interdependencies, pp.215-227, 2009.

S. De-porcellinis, S. Panzieri, and R. Setola, Modelling critical infrastructure via a mixed holistic reductionistic approach, International Journal of Critical Infrastructures, vol.5, issue.1/2, pp.86-99, 2009.
DOI : 10.1504/IJCIS.2009.022851

S. De-porcellinis, S. Panzieri, R. Setola, and G. Ulivi, Simulation of heterogeneous and interdependent critical infrastructures, International Journal of Critical Infrastructures, vol.4, issue.1/2, pp.110-128, 2008.
DOI : 10.1504/IJCIS.2008.016095

G. Digioia, C. Foglietta, S. Panzieri, and A. Falleni, Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks, 2012 European Intelligence and Security Informatics Conference, pp.123-130, 2012.
DOI : 10.1109/EISIC.2012.30

B. Ezell, Y. Haimes, and J. Lambert, Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems, Military Operations Research, vol.6, issue.2, pp.23-33, 2001.
DOI : 10.5711/morj.6.2.23

C. Foglietta, G. Oliva, and S. Panzieri, Online distributed evaluation of interdependent critical infrastructures, Nonlinear Estimation and Applications to Industrial Systems Control, G. Rigatos Nova Science, pp.89-120, 2012.

W. Gao, T. Morris, B. Reaves, and D. Richey, On SCADA control system command and response injection and intrusion detection, Proceedings of the eCrime Researchers Summit, 2010.

B. Genge, I. Nai-fovino, C. Siaterlis, and M. Masera, Analyzing cyberphysical attacks on networked industrial control systems, pp.167-183, 2011.
DOI : 10.1007/978-3-642-24864-1_12

URL : http://publications.jrc.ec.europa.eu/repository/handle/JRC63237

A. Ghorbani and E. Bagheri, The state of the art in critical infrastructure protection: a framework for convergence, International Journal of Critical Infrastructures, vol.4, issue.3, pp.215-244, 2008.
DOI : 10.1504/IJCIS.2008.017438

D. Gianni, Bringing Discrete Event Simulation Concepts into Multi-agent Systems, Tenth International Conference on Computer Modeling and Simulation (uksim 2008), pp.186-191, 2008.
DOI : 10.1109/UKSIM.2008.139

Y. Haimes and D. Li, A hierarchical-multiobjective framework for risk management, Automatica, vol.27, issue.3, pp.579-584, 1991.
DOI : 10.1016/0005-1098(91)90120-Q

M. Mcdonald, G. Conrad, T. Service, and R. Cassidy, Cyber Effects Analysis Using VCSE, Promoting Control System Reliability, 2008.

A. Nieuwenhuijs, E. Luiijf, and M. Klaver, Modeling Dependencies In Critical Infrastructures, pp.205-213, 2008.
DOI : 10.1007/978-0-387-88523-0_15

C. Queiroz, A. Mahmood, J. Hu, Z. Tari, and X. Yu, Building a SCADA Security Testbed, 2009 Third International Conference on Network and System Security, pp.357-364, 2009.
DOI : 10.1109/NSS.2009.82

H. Rahman, M. Armstrong, D. Mao, and J. Marti, I2Sim: A matrix-partition based framework for critical infrastructure interdependencies simulation, 2008 IEEE Canada Electric Power Conference, 2008.
DOI : 10.1109/EPC.2008.4763353

S. Tisue and W. , Netlogo: A simple environment for modeling complexity, presented at the International Conference on Complex Systems, 2004.