L. Bie and X. Wang, Fault Detection and Diagnosis of Continuous Process Based on Multiblock Principal Component Analysis, 2009 International Conference on Computer Engineering and Technology, pp.200-204, 2009.
DOI : 10.1109/ICCET.2009.107

M. Coutinho, G. Lambert-torres, L. Da-silva, J. Da-silva, J. Neto et al., Attack and Fault Identification in Electric Power Control Systems: An Approach to Improve the Security, 2007 IEEE Lausanne Power Tech, pp.103-107, 2007.
DOI : 10.1109/PCT.2007.4538300

A. Creery and E. Byres, Industrial cybersecurity for power systems and SCADA networks, Proceedings of the Fifty-Second Annual Petroleum and Chemical Industry Conference, pp.303-309, 2005.
DOI : 10.1109/pcicon.2005.1524567

X. Dang, E. Albright, and A. Abonamah, Performance analysis of probabilistic packet marking in IPv6, Computer Communications, vol.30, issue.16, pp.3193-3202, 2007.
DOI : 10.1016/j.comcom.2007.05.060

J. Downs and E. Vogel, A plant-wide industrial process control problem, Computers & Chemical Engineering, vol.17, issue.3, pp.245-255, 1993.
DOI : 10.1016/0098-1354(93)80018-I

D. Gamez, S. Nadjm-tehrani, J. Bigham, C. Balducelli, K. Burbeck et al., Safeguarding critical infrastructures, in Dependable Computing Systems: Paradigms, Performance Issues and, pp.479-499, 2005.

T. Kraus, P. Kuhl, L. Wirsching, H. Bock, and M. Diehl, A Moving Horizon State Estimation algorithm applied to the Tennessee Eastman Benchmark Process, 2006 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, pp.377-382, 2006.
DOI : 10.1109/MFI.2006.265620

T. Larsson and S. Skogestad, Plant-wide control ? A review and a new design procedure, Modeling, Identification and Control, pp.209-240, 2000.

T. Mcevoy and S. Wolthusen, A formal adversary capability model for SCADA environments, presented at the Fifth International Workshop on Critical Information Infrastructure Security, 2010.

T. Mcevoy and S. Wolthusen, Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes, pp.81-94, 2010.
DOI : 10.1007/978-3-642-16806-2_6

T. Mcavoy and N. Ye, Base control for the Tennessee Eastman problem, Computers & Chemical Engineering, vol.18, issue.5, pp.383-413, 1994.
DOI : 10.1016/0098-1354(94)88019-0

N. Ricker, Decentralized control of the Tennessee Eastman Challenge Process, Journal of Process Control, vol.6, issue.4, pp.205-221, 1996.
DOI : 10.1016/0959-1524(96)00031-5

D. Sangiorgi and D. Walker, ?-Calculus: A Theory of Mobile Processes, 2001.

D. Simon, Optimal State Estimation: Kalman, H ? and Nonlinear Approaches, 2006.
DOI : 10.1002/0470045345

S. Su, X. Duan, X. Zeng, W. Chan, and K. Li, Context Information based Cyber Security Defense of Protection System, 2007 IEEE Power Engineering Society General Meeting, pp.1477-1481, 2007.
DOI : 10.1109/PES.2007.385649

N. Svendsen and S. Wolthusen, Using Physical Models for Anomaly Detection in Control Systems, Critical Infrastructure Protection III, pp.139-149, 2009.
DOI : 10.1016/j.compstruc.2007.01.008

C. Ten, G. Manimaran, and C. Liu, Cybersecurity for Critical Infrastructures: Attack and Defense Modeling, Part A: Systems and Humans), pp.853-865, 2010.
DOI : 10.1109/TSMCA.2010.2048028

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.2858

J. Verba and M. Milvich, Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS), 2008 IEEE Conference on Technologies for Homeland Security, pp.469-473, 2008.
DOI : 10.1109/THS.2008.4534498