W. E. Vesely, F. F. Goldberg, N. H. Roberts, and D. F. Haasl, Fault tree handbook, 1981.

S. Bruce, Attack trees. Dr. Dobb's, Journal, 1999.

M. Frigault, L. Wang, A. Singhal, and S. Jajodia, Measuring network security using dynamic bayesian network, Proceedings of the 4th ACM workshop on Quality of protection, 1456368.

S. Kumar and E. Spafford, A pattern matching model for misuse intrusion detection, 1994.

M. Bouissou and J. L. Bon, A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes, vol.82, 2003.

L. Pì-etre-cambacédès and M. Bouissou, Beyond attack trees: Dynamic security modeling with boolean logic driven markov processes (bdmp), Proceedings of the 2010 European Dependable Computing Conference, vol.1827752, pp.199-208

M. Bouissou, N. Villatte, H. Bouhadana, and M. Bannelier, Knowledge modelling and reliability processing: presentation of the figaro language and associated tools, 1991.

A. Pernestål, A Bayesian approach to fault isolation with application to diesel engine diagnosis, Thesis, 2007.

F. Cuppens and R. Ortalo, LAMBDA: A Language to Model a Database for Detection of Attacks, pp.197-216, 2000.

F. Cuppens and A. Mì-ege, Alert correlation in a cooperative intrusion detection framework, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.202-215

W. Kanoun, N. Cuppens-boulahia, F. Cuppens, S. Dubus, and A. Martin, Success likelihood of ongoing attacks for intrusion detection and response systems, International Conference on Computational Science and Engineering, vol.3, pp.83-91, 2009.

B. Schroeder and G. A. Gibson, Disk failures in the real world: what does an mttf of 1,000,000 hours mean to you?, Proceedings of the 5th USENIX conference on File and Storage Technologies, 1267904, USENIX Association

F. Cuppens, F. Autrel, A. Mì-ege, and S. Benferhat, Recognizing malicious intention in an intrusion detection process, pp.806-817

J. Rogers, M. Watkins, C. :. Overview, . The, . Sauk et al., , 2008.

F. T. Team, Report of findings on the overtoppingand embankment breach of the upper dam -taum sauk pumped storage project, 2006.

K. , S. , and B. , Before the public service commission state of missouri -staff's initial incident report, 2007.

M. Dacier, Y. Deswarte, and M. Kaâniche, Quantitative assessment of operational security: Models and tools, Information Systems Security, pp.179-86, 1996.

P. Weber, G. Medina-oliva, C. Simon, and B. Iung, Overview on bayesian networks applications for dependability, risk analysis and maintenance areas, Engineering Applications of Artificial Intelligence, vol.25, issue.4, pp.671-682, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00546144

H. Boudali and J. B. Dugan, A new Bayesian network approach to solve dynamic fault trees, 2005.