E. Adler and R. Clark, An Invitation to Social Research ? How It's Done, Cengage Learning, 2015.

A. Sarri, K. Moulinos, and . Stocktaking, Analysis and Recommendations on the Protection of CIIs, European Union Agency for Network and Information Security, 2016.

S. Antonsen, P. Almklov, J. Fenstad, and A. Nybo, Reliability Consequences of Liberalization in the Electricity Sector: Existing Research and Remaining Questions, Journal of Contingencies and Crisis Management, vol.19, issue.4, pp.208-219, 2010.
DOI : 10.2307/41165243

E. Byres, Revealing network threats, fears ? How to use ANSI/ISA-99 standards to improve control system security, pp.26-31, 2011.

M. Jaatun, E. Albrechtsen, M. Line, I. Tondel, and O. Longva, A framework for incident response management in the petroleum industry, International Journal of Critical Infrastructure Protection, vol.2, issue.1-2, pp.26-37, 2009.
DOI : 10.1016/j.ijcip.2009.02.004

S. Johnsen, Resilience at interfaces, Information Management & Computer Security, vol.20, issue.2, pp.71-87, 2012.
DOI : 10.1108/01437739010135529

W. Knowles, D. Prince, D. Hutchison, J. Disso, and K. Jones, A survey of cyber security management in industrial control systems, International Journal of Critical Infrastructure Protection, vol.9, pp.52-80, 2015.
DOI : 10.1016/j.ijcip.2015.02.002

H. Leith and J. Piper, Identification and application of security measures for petrochemical industrial control systems, Journal of Loss Prevention in the Process Industries, vol.26, issue.6, pp.982-993, 2013.
DOI : 10.1016/j.jlp.2013.10.009

M. Line and I. Tondel, Information and communications technology: Enabling and challenging critical infrastructure, in Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis, pp.147-160, 2012.

A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, SCADA security in the light of Cyber-Warfare, Computers & Security, vol.31, issue.4, pp.418-436, 2012.
DOI : 10.1016/j.cose.2012.02.009

N. Business, I. Security, and . Council, Norwegian Computer Crime and Security Survey ? Information Security, Privacy and Data Crime, 2014.

E. Perez and U. , S. investigators find proof of cyberattack on Ukraine power grid, CNN, 2016.
URL : https://hal.archives-ouvertes.fr/in2p3-00015608

R. Piggin, Are industrial control systems ready for the cloud?, International Journal of Critical Infrastructure Protection, vol.9, pp.38-40, 2015.
DOI : 10.1016/j.ijcip.2014.12.005

R. Skotnes, Strengths and weaknesses of technical standards for management of ICT safety and security in electric power supply network companies, Journal of Risk and Governance, vol.3, issue.2, pp.119-134, 2012.

R. Skotnes, Risk perception regarding the safety and security of ICT systems in electric power supply network companies, Safety Science Monitor, vol.19, issue.1 4, 2015.

R. Skotnes and O. Engen, Attitudes toward risk regulation ??? Prescriptive or functional regulation?, Safety Science, vol.77, pp.10-18, 2015.
DOI : 10.1016/j.ssci.2015.03.008

A. Stefanini, G. Doorman, and N. Hadjsaid, ICT vulnerabilities of power systems: Towards a roadmap for future research, pp.13-24, 2008.

K. Stouffer, J. Falco, and K. Scarfone, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, National Institute of Standards and Technology, 2011.

J. Vatn and P. , Hokstad and I. Utne, Defining concepts and categorizing interdependencies , in Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis, pp.13-22, 2012.