Operating in the fog: Security management under uncertainty. Power and Energy Magazine, IEEE, vol.10, issue.5, pp.40-49, 2012. ,
Vulnerable Systems, 2011. ,
DOI : 10.1007/978-0-85729-655-9
Risk Analysis of Electricity Supply, Risk and Interdependencies in Critical Infrastructures. Springer Series in Reliability Engineering, pp.95-108, 2012. ,
DOI : 10.1007/978-1-4471-4661-2_7
Operational Risk Assessment and control: A probabilistic approach, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe), pp.2010-2011, 2010. ,
DOI : 10.1109/ISGTEUROPE.2010.5638975
Smart Grid Security, Anex I. General Concepts and Dependencies with ICT, 2012. ,
A survey on the communication architectures in smart grid, Computer Networks, vol.55, issue.15, pp.3604-3629, 2011. ,
DOI : 10.1016/j.comnet.2011.07.010
Cyber–Physical System Security for the Electric Power Grid, Proceedings of the IEEE, vol.100, issue.1, pp.210-224, 2012. ,
DOI : 10.1109/JPROC.2011.2165269
Protecting Smart Grid Automation Systems Against Cyberattacks, IEEE Transactions on Smart Grid, vol.2, issue.4, pp.782-795, 2011. ,
DOI : 10.1109/TSG.2011.2159999
Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions, IEEE Transactions on Power Systems, vol.19, issue.3, pp.1387-1401, 2004. ,
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.5446
An All-Hazard approach for the vulnerability analysis of critical infrastructures, Proceedings of the European Safety and Reliability Conference 2011, pp.2451-2458, 2011. ,
DOI : 10.1201/b11433-349
URL : https://hal.archives-ouvertes.fr/hal-00658098
Vulnerability Analysis of the Nordic Power System, IEEE Transactions on Power Systems, vol.21, issue.1, pp.402-410, 2006. ,
DOI : 10.1109/TPWRS.2005.857849
A Survey of ICT Vulnerabilities of Power Systems and Relevant Defense Methodologies, 2007 IEEE Power Engineering Society General Meeting, pp.1-8, 2007. ,
DOI : 10.1109/PES.2007.385713
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems, Proceedings of the 5th conference on Information technology education , CITC5 '04, pp.177-181, 2004. ,
DOI : 10.1145/1029533.1029577
Protection System Faults ?? a Comparative Review of Fault Statistics, 2006 International Conference on Probabilistic Methods Applied to Power Systems, pp.1-7, 2006. ,
DOI : 10.1109/PMAPS.2006.360319
Risk indicators as a tool for risk control, Reliability Engineering & System Safety, vol.74, issue.2, pp.129-145, 2001. ,
DOI : 10.1016/S0951-8320(01)00067-9
Building Safety indicators: Part 1 ??? Theoretical foundation, Safety Science, vol.49, issue.2, pp.148-161, 2011. ,
DOI : 10.1016/j.ssci.2010.05.012
Risk modelling of maintenance work on major process equipment on offshore petroleum installations, Journal of Loss Prevention in the Process Industries, vol.25, issue.2, pp.274-292, 2012. ,
DOI : 10.1016/j.jlp.2011.11.001
Development of early warning indicators based on accident investigation, PSAM9 International Probabilistic Safety Assessment and Management Conference, 2008. ,
Development of early warning indicators based on resilience engineering, PSAM10 International Probabilistic Safety Assessment and Management Conference, 2010. ,
Safety performance measurement, Journal of Industrial Engineering, vol.10, pp.12-16, 1959. ,
The safety measurement problem revisited, Safety Science, vol.47, issue.4, pp.486-489, 2009. ,
DOI : 10.1016/j.ssci.2008.07.023
Prevention of Accidents through Experience Feedback, 2000. ,
DOI : 10.1201/b17206
Risk indicators for major hazards on offshore installations, Safety Science, vol.48, issue.6, pp.770-787, 2010. ,
DOI : 10.1016/j.ssci.2010.02.015
Proposing safety performance indicators for helicopter offshore on the norwegian continental shelf, 10th International Probabilistic Safety Assessment & Management Conference, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00613956
Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines (CAG), version 3, 2011. ,
Complete Guide to Security and Privacy Metrics. Measuring Regulatory Compliance, Operational Resilience and ROI, 2007. ,
DOI : 10.1201/9781420013283
Designing a Security Audit Plan for a Critical Information Infrastructure (CII), Securing Critical Infrastructures and Critical Control Systems: Approaches for threat Protection. IGI Global, pp.262-285, 2013. ,
DOI : 10.4018/978-1-4666-2659-1.ch011