I. Dos-anjos, A. Brito, and P. M. Pires, A model for security management of SCADA systems, 2008 IEEE International Conference on Emerging Technologies and Factory Automation, pp.448-451, 2008.
DOI : 10.1109/ETFA.2008.4638433

S. Boyer, Supervisory Control And Data Acquisition, International Society of Automation?USA, 2010.

A. Cárdenas, S. Amin, Z. Lin, Y. Huang, C. Y. Huang et al., Attacks against process control systems, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.355-366, 2011.
DOI : 10.1145/1966913.1966959

M. Chen, C. Nolan, X. Wang, S. Adhikari, F. Li et al., Hierarchical Utilization Control for Real-Time and Resilient Power Grid, 2009 21st Euromicro Conference on Real-Time Systems, pp.66-75, 2009.
DOI : 10.1109/ECRTS.2009.19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.5243

J. Downs and E. Vogel, A plant-wide industrial process control problem, Computers & Chemical Engineering, vol.17, issue.3, pp.245-255, 1993.
DOI : 10.1016/0098-1354(93)80018-I

D. Drummond, A new approach to China, 2010.

S. East, J. Butts, M. Papa, and S. Shenoi, A Taxonomy of Attacks on the DNP3 Protocol, IFIP Advances in Information and Communication Technology 311, pp.67-81, 2009.
DOI : 10.1016/j.ijcip.2008.08.003

B. Genge, I. N. Fovino, C. Siaterlis, and M. Masera, Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems, Critical Infrastructure Protection, pp.167-183, 2011.
DOI : 10.1007/978-3-642-24864-1_12

K. Ji and D. Wei, Resilient control for wireless networked control systems, International Journal of Control, Automation and Systems, vol.82, issue.1, pp.285-293, 2011.
DOI : 10.1007/s12555-011-0210-7

N. Fovino, I. Carcano, A. Masera, M. Trombetta, and A. , An experimental investigation of malware attacks on SCADA systems, International Journal of Critical Infrastructure Protection, vol.2, issue.4, pp.139-145, 2009.
DOI : 10.1016/j.ijcip.2009.10.001

O. Pal, S. Saiwan, P. Jain, Z. Saquib, and D. Patel, Cryptographic Key Management for SCADA System: An Architectural Framework, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp.169-174, 2009.
DOI : 10.1109/ACT.2009.51

N. Ricker, Tennessee Eastman challenge archive, 2002.

. Siemens, Security concept pcs 7 and wincc -basic document, 2008.

J. Sozio, Intelligent parameter adaptation for chemical processes, 1999.

D. Wei and K. Ji, Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights, 2010 3rd International Symposium on Resilient Control Systems, pp.15-22, 2010.
DOI : 10.1109/ISRCS.2010.5603480

B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad et al., An integrated experimental environment for distributed systems and networks, Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pp.255-270, 2002.
DOI : 10.1145/1060289.1060313

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.3768

Q. Zhu, D. Wei, and T. Ba¸sarba¸sar, Secure routing in smart grids, Workshop on Foundations of Dependable and Secure Cyber-Physical Systems, 2011.