, Armed Forces History Museum, World War II's U.S. Ghost Army, Largo, Florida (www.armedforcesmuseum.com/world-war-iis-us-ghost-ar my), 2014.

A. Botta, A. Dainotti, and A. Pescape, A tool for the generation of realistic network workload for emerging networking scenarios, Computer Networks, vol.56, issue.15, pp.3531-3547, 2012.
DOI : 10.1016/j.comnet.2012.02.019

A. Botta, W. De-donato, A. Dainotti, S. Avallone, and A. Pescape, D-ITG 2.8.1 Manual, Computer for Interaction and Communications (COMICS) Group, Department of Electrical Engineering and Information Technologies, p.2013

L. Even, IDFAQ: What is a Honeypot? SANS Institute, Bethesda, Mary- land (www.sans.org/security-resources, 2000.

. Gartner, Gartner says the worlds of IT and operational technology are converging, Press Release, 2011.

K. Girtz, B. Mullins, M. Rice, and J. Lopez, Practical Application Layer Emulation in Industrial Control System Honeypots, pp.83-98, 2016.
DOI : 10.1016/j.ijcip.2015.04.002

URL : https://hal.archives-ouvertes.fr/hal-01614865

J. Harrison, Honeypots: The sweet spot in network security, Computerworld, 2003.

, Control Systems Cyber Security: Defense in Depth Strategies, 2006.

. Ixia, IxLoad Application Replay, Data Sheet, Document No. 915-1744-01 Rev D, 2013.

. Ixia, IxLoad Overview ? Converged Multiplay Service Validation, Data Sheet, Document No. 915-1710-01-2161 Rev S, 2016.

I. Mokube and M. Adams, Honeypots, Proceedings of the 45th annual southeast regional conference on , ACM-SE 45, pp.321-326, 2007.
DOI : 10.1145/1233341.1233399

. Netload, Test Traffic Solution, p.2014

. Netload, Stateful Traffic Mix Tester Solutions, p.2015

U. Netload and . Guide-for, NetLoad Product Series (Revision, vol.8, issue.9, p.2016

. Ostinato, Ostinato User Guide (www.gitbook.com, p.2016

N. Provos, A virtual honeypot framework, Proceedings of the Thirteenth USENIX Security Symposium, 2004.

W. Shaw, Cybersecurity for SCADA Systems, PennWell Corporation, 2006.

. Siemens, T. Network-on, and . Ip, Technical Specification Sheet (Revision 1), Document No. 149-967, 2003.

S. Siemens, APOGEE Brochure (Revision, vol.8, 2011.

S. Siemens and . Apogee-scalable-brochure, , pp.611-056, 2012.

S. Smith, Catching Flies: A Guide to the Various Flavors of Honeypots, 2016.

W. Solarwinds and . Killer, Network Traffic Generator with Engineer's Toolset, p.2016

K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, and A. Hahn, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800- 82, National Institute of Standards and Technology, issue.2, 2015.
DOI : 10.6028/nist.sp.800-82r2

P. Warner, Automatic Configuration of Programmable Logic Controller Emulators, 2015.

K. Wilhoit, The SCADA That Didn't Cry Wolf ? Who's Really Attacking Your ICS Equipment, Research Paper, Trend Micro, 2013.

M. Winn, M. Rice, S. Dunlap, J. Lopez, and B. Mullins, Constructing cost-effective and targetable industrial control system honeypots for production networks, International Journal of Critical Infrastructure Protection, vol.10, pp.47-58, 2015.
DOI : 10.1016/j.ijcip.2015.04.002