, Stuxnet, L'Informaticien, 2010.

L. Bloch, C. Wolfhugel, A. Kokos, G. Billois, A. Soullié et al., , 2016.

M. Cislo, Virus and industrial processes, WINS/CNMS Bachelor memoir, Univ. Grenoble Alpes, 2015.

L. O. N-falliere, E. Murchu, and . Chien, , 2011.

U. Crashoverride, , 2017.

. Dragos and . Crashoverride, Analysis of the threat to electric grid operations, 2017.

O. Koucham, Détection d'intrusions pour les systèmes de contrôle industriels, 2018.

A. Mkhida, Contribution à l'évaluation de la sûreté de fonctionnement des Systèmes Instrumentés de Sécurité intégrant de l'Intelligence, 2008.

J. C. Laprie, Sûreté de fonctionnement et tolérance aux fautes : concepts de base, rapport LAAS n°88.287, paru dans les techniques de l'ingénieur, 1988.

R. Ghostine, Influence des fautes transitoires sur la fiabilité d'un système commandé en réseau, 2008.

, Sécurité fonctionnelle des systèmes électriques, électroniques et électroniques programmables relatifs à la sécurité. Commission Electrotechnique Internationale, 2000.

G. Moncelet, Application des réseaux de Petri à l'évaluation de la sûreté de fonctionnement des systèmes mécatroniques du monde automobile, vol.3076, 1998.

P. J. Portugal and A. Carvalho, A Stochastic Petri Net Framework for Dependability Evaluation of Fieldbus Networks-A Controller Area Network (CAN) Example, International IEEE Conference in Mechatronics and Robotics, 2004.

N. Navet, Y. Song, and F. Simonot, Worst-Case Deadline Probability in Real-Time Applications Distributed over Controller Area Network, Journal of systems Architecture, vol.46, issue.1, pp.607-617, 2000.
DOI : 10.1016/s1383-7621(99)00016-8

URL : https://hal.archives-ouvertes.fr/inria-00099080

J. Galdun, J. Thiriet, and . Ligu?, Study of different load dependencies among shared redundant systems, International Workshop on Real Time Software RTS'2008 within International Multiconference on Computer Science and Information Technology IMCSIT, pp.609-615, 2008.
DOI : 10.1109/imcsit.2008.4747306

URL : https://hal.archives-ouvertes.fr/hal-00349408

R. Ghostine, M. Aubry, and . Robert, A Framework for the Reliability Evaluation of Networked Control Systems, 17 th IFAC World Congress, pp.6833-6838, 2008.

P. Barger, M. Thiriet, and . Robert, Dependablity study in distributed control systems integrating smart devices, Low Cost, pp.79-84, 2004.
DOI : 10.1016/s1474-6670(17)32345-5

J. Tixier, G. Dusserre, O. Salvi, and D. Gaston, Review of 62 risk analysis methodologies of industrial plants, pp.291-303, 2002.
URL : https://hal.archives-ouvertes.fr/ineris-00961858

C. Davis, M. Schiller, and K. Wheeler, IT Auditing: using control to protect assets, 2007.

E. Cole, R. Krutz, and . Conley, , 2005.

D. Diallo and M. Feuillet, Détection d'intrusion dans les systèmes industriels : Suricata et le cas de Modbus, CAESAR 2014, website of ANSSI, 2018.

S. Cheung and K. Skinner, Using Model-based Intrusion Detection for SCADA Networks, Proc. SCADA Security Scientific Symposium, pp.127-134, 2007.

H. Lin, A. Slagell, and C. D. Martino, Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol, Proc. CSIIRW '13, pp.1-4, 2013.

N. Goldenberg and A. Wool, Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems, International Journal of Critical Infrastructure Protection, vol.6, issue.2, pp.63-75, 2013.

A. Kleinmann and A. Wool, Accurate modeling of the siemens s7 scada protocol for intrusion detection and digital forensics, Journal of Digital Forensics, Security and Law, vol.9, issue.2, 2014.

R. Barbosa, R. Sadre, and A. Pras, Flow whitelisting in SCADA networks, Int. Journal of Critical Infrastructure Protection, vol.6, issue.34, pp.150-158, 2013.
DOI : 10.1016/j.ijcip.2013.08.003

URL : http://vbn.aau.dk/ws/files/168630429/index.pdf

H. Hadeli, R. Schierholz, M. Braendle, and C. Tuduce, Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration, IEEE Conference on Emerging Technologies and Factory Automation ETFA 2009, pp.1-8, 2009.
DOI : 10.1109/etfa.2009.5347134

S. Ponomarev and T. Atkison, Industrial Control System Network Intrusion Detection by Telemetry Analysis, IEEE Transactions on Dependable and Secure Computing, vol.5971, issue.c, pp.1-1, 2015.
DOI : 10.1109/tdsc.2015.2443793

D. Yang, A. Usynin, and J. Hines, Anomaly-based intrusion detection for SCADA systems, 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05), pp.12-16, 2005.

R. Ramos, R. Barbosa, R. Sadre, and A. Pras, Difficulties in Modeling SCADA Traffic : A Comparative Analysis, Proceedings of the 13th international conference on Passive and Active Measurement (PAM '12), pp.126-135, 2012.

O. Linda, T. Vollmer, and M. Manic, Neural Network based Intrusion Detection System for critical infrastructures, International Joint Conference on Neural Networks, pp.1827-1834, 2009.
DOI : 10.1109/ijcnn.2009.5178592

URL : https://digital.library.unt.edu/ark:/67531/metadc927583/m2/1/high_res_d/968568.pdf

C. Zimmer and B. Bhat, Time-based intrusion detection in cyberphysical systems, Proc. First ACM/IEEE Int. Conf. on CPS, pp.109-118, 2010.

J. Rrushi and K. Kang, Detecting Anomalies in Process Control Networks, IFIP Advances in Information and Communication Technology, vol.311, pp.151-165, 2009.
DOI : 10.1007/978-3-642-04798-5_11

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-04798-5_11.pdf

J. Reeves, A. Ramaswamy, M. Locasto, S. Bratus, and S. Smith, Intrusion detection for resource-constrained embedded control systems in the power grid, International Journal of Critical Infrastructure Protection, vol.5, issue.2, pp.74-83, 2012.

C. Bellettini and J. L. Rrushi, A product machine model for anomaly detection of interposition attacks on cyber-physical systems, IFIP International Federation for Information Processing, vol.278, pp.285-299, 2008.

D. Hadziosmanovic, R. Sommer, and E. Zambon, Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems, Proc. ACSAC 14, 2014.

N. Erez and A. Wool, Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems, International Journal of Critical Infrastructure Protection, vol.10, pp.59-70, 2015.
DOI : 10.1016/j.ijcip.2015.05.001

A. Carcano, I. N. Fovino, M. Masera, and A. Trombetta, Statebased network intrusion detection systems for SCADA protocols: A proof of concept, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp.6027-138, 2010.

I. N. Fovino, A. Carcano, T. D. Murel, A. Trombetta, and M. Masera, Modbus/ dnp3 state-based intrusion detection system, Advanced Information Networking and Applications (AINA), pp.729-736, 2010.
DOI : 10.1109/aina.2010.86

R. Mitchell and I. Chen, Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. Dependable and Secure Computing, IEEE Transactions on, vol.12, issue.1, pp.16-30, 2015.
DOI : 10.1109/tdsc.2014.2312327

S. Pan, T. Morris, and U. Adhikari, Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems, IEEE Transactions on Smart Grid, vol.6, issue.6, pp.3104-3113, 2015.
DOI : 10.1109/tsg.2015.2409775

R. Berthier, W. H. Sanders, and H. Khurana, Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions, Smart Grid Communications (SmartGridComm), 2010.
DOI : 10.1109/smartgrid.2010.5622068

, First IEEE International Conference on, 2010.

M. Parvania, G. Koutsandria, V. Muthukumary, S. Peisert, C. Mcparland et al., Hybrid control network intrusion detection systems for automated power distribution systems, 44th Annual IEEE/IFIP International Conference on, pp.774-779, 2014.
DOI : 10.1109/dsn.2014.81

URL : http://www.cs.ucdavis.edu/~peisert/research/2014-TOSG-ADS.pdf

C. Zhou, S. Huang, and N. Xiong, Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation, IEEE Trans. Systems, Man, and Cybernetics: Systems, vol.45, issue.10, pp.1345-1360, 2015.

J. Galdun, Dependability Analysis of Networked Control Systems with Consideration of Shared Redundant Subsystems, 2008.

J. Ligu?ová, J. Thiriet, P. Ligu?, and . Barger, Effect of Element Initialization in Synchronous Networked control System to Control Quality, Reliability and Maintainability Annual Symposium, RAMS, pp.135-140, 2004.

F. Lian, . Moyne, and . Tilbury, Performance evaluation of control networks: Ethernet, ControlNet,and DeviceNet, IEEE Control Systems Magazine, vol.21, pp.66-83, 2001.

D. Paret, L. Bus, C. Aplications, . Canopen, . Devicenet et al., , 1999.

J. Galdun, R. Ghostine, J. Thiriet, J. Ligu?, and . Sarnovský, Definition and modelling of the communication architecture for the control of a helicopter-drone, 8th IFAC Symposium on Cost Oriented Automation, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00167365

A. Tanwani, J. Galdun, S. Thiriet, S. Lesecq, and . Gentil, Experimental Networked Embedded Mini Drone-Part I. Consideration of Faults, pp.4332-4337, 2007.
DOI : 10.23919/ecc.2007.7068611

URL : https://hal.archives-ouvertes.fr/hal-00129457

L. Fredriksson, A CAN Kingdom-Rev 3.01, KVASER AB, 1995.

Y. Fourastier and L. Pietre-cambaceded, Cybersécurité des systèmes industriels, Cepadues, 2015.

M. Kabir-querrec, Cyber security of the smart grid control systems: intrusion detection in IEC 61850 communication networks, 2017.

. Iso/iec, Information technology-Security techniques-Code of practice for information security controls, IEC, 2013.

. Iso/iec, Information technology-Security techniques-Information security risk management, IEC, 2018.