G. Bernieri, E. E. Miciolino, F. Pascucci, and R. Setola, Monitoring system reaction in a cyber-physical testbed under cyber attacks, Computers and Electrical Engineering, vol.59, pp.86-98, 2017.

J. Calvet, C. Davis, J. Fernandez, W. Guizani, M. Kaczmarek et al., Isolated virtualized clusters: Testbeds for high-risk security experimentation and training, Proceedings of the Third International Conference on Cyber Security Experimentation and Test, 2010.

C. Cerrudo, U. S. Hacking, U. K. Australia, and F. , traffic control systems, 2014.

G. Cookson and B. Pishue, INRIX Global Traffic Scorecard, INRIX Research, 2017.

J. Ernst and A. Michaels, Framework for evaluating the severity of a cyber vulnerability of a traffic cabinet, Transportation Research Record: Journal of the Transportation Research Board, vol.2619, pp.55-63, 2017.

S. Faye, C. Chaudet, and I. Demeure, Control of Urban Road Traffic by a Fixed Network of Wireless Sensors, Telecom ParisTech, 2012.

B. Ghena, W. Beyer, A. Hillaker, J. Pevarnek, and J. Halderman, Green lights forever: Analyzing the security of traffic infrastructure, Proceedings of the Eighth USENIX Workshop on Offensive Technologies, 2014.

R. Gordon and W. Tighe, Traffic Control Systems Handbook, Publication No. FHWA-HOP-06-006, Federal Highway Administration, 2005.

C. Heracleous, E. E. Miciolino, R. Setola, F. Pascucci, D. Eliades et al., Critical infrastructure online fault detection: Application in water supply systems, Proceedings of the Ninth International Conference on Critical Information Infrastructures Security, pp.94-106, 2014.

Y. Huang, A. Cardenas, S. Amin, Z. Lin, H. Tsai et al., Understanding the physical and economic consequences of attacks on control systems, International Journal of Critical Infrastructure Protection, vol.2, issue.3, pp.73-83, 2009.

P. Koonce, Traffic Signal Timing Manual, Publication No. FHWA-HOP-08-024, Federal Highway Administration, 2008.

D. Krajzewicz, G. Hertkorn, P. Wagner, and C. Rossel, SUMO (Simulation of Urban Mobility) -An open-source traffic simulation, Proceedings of the Fourth Middle Eastern Symposium on Simulation and Modeling, pp.183-187, 2002.

M. , Rocking the pocket book: Hacking chemical plants for competition and extortion, presented at Black Hat USA, 2015.

M. Krotofil and A. D. , Hack like a movie star: Step-by-step guide to crafting SCADA payloads for physical attacks with catastrophic consequences, 2015.

A. Lemay, J. Fernandez, and S. Knight, An isolated virtual cluster for SCADA network security research, Proceedings of the First International Symposium on ICS and SCADA Cyber Security Research, pp.88-96, 2013.

M. Luallen, Critical Control System Vulnerabilities Demonstrated -And What to Do About Them, 2011.

, Ministry of Transportation Ontario, Book 19 -Advanced Traffic Management Systems, 2007.

, Traffic Signals, vol.101, 2018.

M. Tubaishat, Y. Shang, and H. Shi, Adaptive traffic light control with wireless sensor networks, Proceedings of the Fourth IEEE Consumer Communications and Networking Conference, pp.187-191, 2007.