F. Alsiherov and T. Kim, Research trend on secure SCADA network technology and methods, WSEAS Transactions on Systems and Control, vol.8, issue.5, pp.635-645, 2010.

F. Alsiherov and T. Kim, Secure SCADA network technology and methods, Proceedings of the Twelfth WSEAS International Conference on Automatic Control, Modeling and Simulation, pp.434-438, 2010.

G. Balbo, Introduction to Stochastic Petri Nets, Lectures on Formal Methods and Performance Analysis, pp.84-155, 2001.
DOI : 10.1007/3-540-44667-2_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.1476

N. Baukari and A. Aljane, Security and auditing of VPN, Proceedings of Third International Workshop on Services in Distributed and Networked Environments, pp.132-138, 1996.
DOI : 10.1109/SDNE.1996.502456

M. Bellare, R. Canetti, and H. Krawczyk, Keying Hash Functions for Message Authentication, Proceedings of the Sixteenth International Cryptology Conference, pp.1-15, 1996.
DOI : 10.1007/3-540-68697-5_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.8430

R. Brown, Stuxnet worm causes industry concern for security firmsStuxnet-worm-causes-industry-concern-for-security- firms.html), 2010.

D. Deavours, G. Clark, T. Courtney, D. Daly, S. Derisavi et al., The Mobius framework and its implementation, IEEE Transactions on Software Engineering, vol.28, issue.10, pp.956-969, 2002.
DOI : 10.1109/TSE.2002.1041052

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.2897

S. Dispensa, How to reduce malware-induced security breaches, eWeek .com, 2010.

V. Gungor and F. Lambert, A survey on communication networks for electric system automation, Computer Networks, vol.50, issue.7, pp.877-897, 2006.
DOI : 10.1016/j.comnet.2006.01.005

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.277

H. Hamed, E. Shaer, and W. Marrero, Modeling and Verification of IPSec and VPN Security Policies, 13TH IEEE International Conference on Network Protocols (ICNP'05), pp.259-278, 2005.
DOI : 10.1109/ICNP.2005.25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.8848

D. Harkins and D. Carrel, The Internet Key Exchange, RFC 2409, 1998.
DOI : 10.17487/rfc2409

R. Hills, C. Vpn-security, W. Flaws, . Paper, and . Monitor, United Kingdom (www.nta-monitor.com/posts, 2005.

P. Li, W. Zhou, and Y. Wang, Getting the real-time precise roundtrip time for stepping stone detection, Proceedings of the Fourth International Conference on Network and System Security, pp.377-382, 2010.
DOI : 10.1109/nss.2010.36

. Modbus-ida, Modbus Application Protocol Specification V.1.1b, Hopkinton , Massachusetts (www.modbus.org/docs/Modbus Application Proto col V1 1b, 2006.

N. Nayak and S. Ghosh, Different flavors of man-in-the-middle attack: Consequences and feasible solutions, Proceedings of the Third IEEE International Conference on Computer Science and Information Technology, pp.491-495, 2010.

S. Patel, G. Bhatt, and J. Graham, Improving the cyber security of SCADA communication networks, Communications of the ACM, vol.52, issue.7, pp.139-142, 2009.
DOI : 10.1145/1538788.1538820

K. Paterson, A cryptographic tour of the IPsec standards, Information Security Technical Report, vol.11, issue.2, pp.72-81, 2006.
DOI : 10.1016/j.istr.2006.03.004

R. Pereira and S. Beaulieu, Extended Authentication within ISAKMP, Internet Draft, 1999.

W. Sanders and J. Meyer, Stochastic activity networks: Formal definitions and concepts, in Lectures on Formal Methods and Performance Analysis, pp.315-343, 2001.
DOI : 10.1007/3-540-44667-2_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.5191

V. Sempere, T. Albero, and J. Silvestre, Analysis of communication alternatives in a heterogeneous network for a supervision and control system, Computer Communications, vol.29, issue.8, pp.1133-1145, 2006.
DOI : 10.1016/j.comcom.2005.07.001

S. Singh, M. Cukier, and W. Sanders, Probabilistic validation of an intrusion-tolerant replication system, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., pp.615-624, 2003.
DOI : 10.1109/DSN.2003.1209971

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.1781

D. Wang, B. Madan, and K. Trivedi, Security analysis of SITAR intrusion tolerance system, Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems in association with 10th ACM Conference on Computer and Communications Security, SSRS '03, pp.23-32, 2003.
DOI : 10.1145/1036921.1036924