M. Bauer, Paranoid Penguin: AppArmor in Ubuntu 9, Linux Journal, issue, vol.185, 2009.

, Version 1.8, Verl, Germany (download.beckhoff.com/download/document/ipc/em bedded-pc/embedded-pc-cx/cx9020_hwen, p.2017

E. Byres, A. Ginter, and J. Langill, How Stuxnet Spreads ? A Study of Infection Paths in Best Practice Systems, Version 1, 2011.

R. Candell, T. Zimmerman, and K. Stouffer, An Industrial Control System Cybersecurity Performance Testbed, National Institute of Standards and Technology, vol.8089, 2015.
DOI : 10.6028/NIST.IR.8089

I. Center, . Security, E. Benchmarks, and . Greenbush, , p.2017

A. Creery and E. Byres, Industrial cybersecurity for power system and SCADA networks, Proceedings of the Industry Applications Society Fifty- Second Annual Petroleum and Chemical Industry Conference, pp.303-309, 2005.
DOI : 10.1109/pcicon.2005.1524567

C. Fairchild, T. Harman, R. Robotics, and . Example, , 2016.

W. Fitzgerald and S. Foley, Avoiding inconsistencies in the Security Content Automation Protocol, 2013 IEEE Conference on Communications and Network Security (CNS), pp.454-461, 2013.
DOI : 10.1109/CNS.2013.6682760

R. Fritz, Android 4 Benchmark V1.0.0, Center for Internet Security, East Greenbush, p.2012

T. Hedberg, J. Lubell, L. Fischer, L. Maggiano, and A. Feeney, Testing the Digital Thread in Support of Model-Based Manufacturing and Inspection, Journal of Computing and Information Science in Engineering, vol.16, issue.2, p.2016
DOI : 10.1115/1.4032697

C. Hlyne, P. Zavarsky, and S. Butakov, SCAP benchmark for Cisco router security configuration compliance, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp.270-276, 2015.
DOI : 10.1109/ICITST.2015.7412104

, Advisory (ICSA-16-278-02), Beckhoff Embedded PC Images and TwinCAT Components Vulnerabilities, Industrial Control Systems Cyber Emergency Response Team, 2014.

P. Kampanakis, Security Automation and Threat Information-Sharing Options, IEEE Security & Privacy, vol.12, issue.5, pp.42-51, 2014.
DOI : 10.1109/MSP.2014.99

E. Kimber, Hyperdocument authoring link management using Git and XQuery in service of an abstract hyperdocument management model applied to DITA hyperdocuments, Proceedings of Balisage: The Markup Conference, 2015.

C. Kuo and C. Yang, Security Design for Configuration Management of Android Devices, 2015 IEEE 39th Annual Computer Software and Applications Conference, pp.249-254, 2015.
DOI : 10.1109/COMPSAC.2015.239

R. Lee, M. Assante, T. Conway, G. Steel-mill-cyber-attack, I. Cp et al., Case Study Paper , SANS Institute, Bethesda, Maryland (ics.sans.org/media/ICS- CPPE-case-Study-2-German-Steelworks_Facility.pdf), 2014.

J. , Extending the cybersecurity digital thread with XForms, Proceedings of Balisage: The Markup Conference, 2015.

G. Mcguire and E. Reid, The State of Security Automation Standards ? 2011, A Survey, MP110439, MITRE Corporation, 2011.

S. Mclaughlin, C. Konstantinou, X. Wang, L. Davi, A. Sadeghi et al., The Cybersecurity Landscape in Industrial Control Systems, Proceedings of the IEEE, vol.104, issue.5, pp.1039-1057, 2016.
DOI : 10.1109/JPROC.2015.2512235

M. Munaro, C. Lewis, D. Chambers, P. Hvass, and E. Menegatti, RGB-D Human Detection and Tracking for Industrial Environments, Proceedings of the Thirteenth Conference on Intelligent Autonomous Systems, pp.1655-1668, 2014.
DOI : 10.1007/978-3-319-08338-4_119

, National Cybersecurity and Communications Integration Center/Industrial Control Systems Cyber Emergency Response Team, NCCIC/ICS- CERT Industrial Control Systems Assessment Summary Report, FY 2015

, National Institute of Standards and Technology, Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publication 800-53, 2013.

, National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, 2014.

, National Institute of Standards and Technology, The United States Government Configuration Baseline (USGCB), p.2017

, Darwin Information Typing Architecture (DITA) Version 1.3 Part 0: Overview (Plus Errata 01, OASIS Standard (Incorporating Approved Errata), 2016.

, Version 2.5, Document No. Formal, OMG UML), 2015.

S. Openscap and . Security, Guide (www.open-scap.org/security-poli cies/scap-security-guide, p.2017

O. and O. Documentation, , p.2017

M. Preisler, Contributing to SCAP Security Guide ? Part 1 (martin.preisler.mecontributing-to-scap-security-gui de-part-1), 2016.

S. Quinn, K. Scarfone, and D. Waltermire, Guide to Adopting and Using the Security Content Automation Protocol (SCAP), Version 1.2 (Draft), NIST Special Publication 800-117, Revision 1, National Institute of Standards and Technology, 2012.

S. Quinn, M. Souppaya, M. Cook, and K. Scarfone, National Checklist Program for IT Products ? Guidelines for Checklist Users and Developers, NIST Special Publication National Institute of Standards and Technology, vol.80070, issue.3, 2015.

S. Radack and R. Kuhn, Managing Security: The Security Content Automation Protocol, IT Professional, vol.13, issue.1, pp.9-11, 2011.
DOI : 10.1109/MITP.2011.11

A. Sadeghi, C. Wachsmann, and M. Waidner, Security and privacy challenges in industrial internet of things, Proceedings of the 52nd Annual Design Automation Conference on, DAC '15, 2015.
DOI : 10.1016/j.arcontrol.2010.02.008

. Swri-manufacturing-technologies, , p.2017

D. Vecchiato, M. Vieira, and E. Martins, The Perils of Android Security Configuration, Computer, vol.49, issue.6, pp.15-21, 2016.
DOI : 10.1109/MC.2016.184

D. Waltermire and B. Cheikes, Forming Common Platform Enumeration (CPE) Names from Software Identification (SWID) Tags, NISTIR 8085 (Draft), National Institute of Standards and Technology, 2015.

D. Waltermire, B. Cheikes, L. Feldman, and G. Witte, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags, NIS- TIR 8060, National Institute of Standards and Technology, 2016.

D. Waltermire, C. Schmidt, K. Scarfone, and N. Ziring, Specification for the Extensible Configuration Checklist Description Format (XCCDF), Version 1.2, NISTIR 7275, National Institute of Standards and Technology, vol.4, 2012.

R. White, H. Christensen, and M. Quigley, SROS: Securing ROS over the wire, the graph and through the kernel, presented at the IEEE-RAS International Conference on Humanoid Robots, 2016.

, Extensible Markup Language (XML) 1.0 (Fifth Edition), W3C Recommendation, Massachusetts Institute of Technology, World Wide Web Consortium, 2008.

T. Zimmerman, Metrics and Key Performance Indicators for Robotic Cybersecurity Performance Analysis, NISTIR 8177, National Institute of Standards and Technology, 2017.