, Stuxnet, L'Informaticien, 2010.
, , 2016.
Virus and industrial processes, WINS/CNMS Bachelor memoir, Univ. Grenoble Alpes, 2015. ,
, , 2011.
, , 2017.
Analysis of the threat to electric grid operations, 2017. ,
Détection d'intrusions pour les systèmes de contrôle industriels, 2018. ,
Contribution à l'évaluation de la sûreté de fonctionnement des Systèmes Instrumentés de Sécurité intégrant de l'Intelligence, 2008. ,
, Sûreté de fonctionnement et tolérance aux fautes : concepts de base, rapport LAAS n°88.287, paru dans les techniques de l'ingénieur, 1988.
Influence des fautes transitoires sur la fiabilité d'un système commandé en réseau, 2008. ,
, Sécurité fonctionnelle des systèmes électriques, électroniques et électroniques programmables relatifs à la sécurité. Commission Electrotechnique Internationale, 2000.
Application des réseaux de Petri à l'évaluation de la sûreté de fonctionnement des systèmes mécatroniques du monde automobile, vol.3076, 1998. ,
A Stochastic Petri Net Framework for Dependability Evaluation of Fieldbus Networks-A Controller Area Network (CAN) Example, International IEEE Conference in Mechatronics and Robotics, 2004. ,
Worst-Case Deadline Probability in Real-Time Applications Distributed over Controller Area Network, Journal of systems Architecture, vol.46, issue.1, pp.607-617, 2000. ,
DOI : 10.1016/s1383-7621(99)00016-8
URL : https://hal.archives-ouvertes.fr/inria-00099080
Study of different load dependencies among shared redundant systems, International Workshop on Real Time Software RTS'2008 within International Multiconference on Computer Science and Information Technology IMCSIT, pp.609-615, 2008. ,
DOI : 10.1109/imcsit.2008.4747306
URL : https://hal.archives-ouvertes.fr/hal-00349408
A Framework for the Reliability Evaluation of Networked Control Systems, 17 th IFAC World Congress, pp.6833-6838, 2008. ,
Dependablity study in distributed control systems integrating smart devices, Low Cost, pp.79-84, 2004. ,
DOI : 10.1016/s1474-6670(17)32345-5
Review of 62 risk analysis methodologies of industrial plants, pp.291-303, 2002. ,
URL : https://hal.archives-ouvertes.fr/ineris-00961858
IT Auditing: using control to protect assets, 2007. ,
, , 2005.
, Détection d'intrusion dans les systèmes industriels : Suricata et le cas de Modbus, CAESAR 2014, website of ANSSI, 2018.
Using Model-based Intrusion Detection for SCADA Networks, Proc. SCADA Security Scientific Symposium, pp.127-134, 2007. ,
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol, Proc. CSIIRW '13, pp.1-4, 2013. ,
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems, International Journal of Critical Infrastructure Protection, vol.6, issue.2, pp.63-75, 2013. ,
Accurate modeling of the siemens s7 scada protocol for intrusion detection and digital forensics, Journal of Digital Forensics, Security and Law, vol.9, issue.2, 2014. ,
Flow whitelisting in SCADA networks, Int. Journal of Critical Infrastructure Protection, vol.6, issue.34, pp.150-158, 2013. ,
DOI : 10.1016/j.ijcip.2013.08.003
URL : http://vbn.aau.dk/ws/files/168630429/index.pdf
Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration, IEEE Conference on Emerging Technologies and Factory Automation ETFA 2009, pp.1-8, 2009. ,
DOI : 10.1109/etfa.2009.5347134
Industrial Control System Network Intrusion Detection by Telemetry Analysis, IEEE Transactions on Dependable and Secure Computing, vol.5971, issue.c, pp.1-1, 2015. ,
DOI : 10.1109/tdsc.2015.2443793
Anomaly-based intrusion detection for SCADA systems, 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05), pp.12-16, 2005. ,
Difficulties in Modeling SCADA Traffic : A Comparative Analysis, Proceedings of the 13th international conference on Passive and Active Measurement (PAM '12), pp.126-135, 2012. ,
Neural Network based Intrusion Detection System for critical infrastructures, International Joint Conference on Neural Networks, pp.1827-1834, 2009. ,
DOI : 10.1109/ijcnn.2009.5178592
URL : https://digital.library.unt.edu/ark:/67531/metadc927583/m2/1/high_res_d/968568.pdf
Time-based intrusion detection in cyberphysical systems, Proc. First ACM/IEEE Int. Conf. on CPS, pp.109-118, 2010. ,
Detecting Anomalies in Process Control Networks, IFIP Advances in Information and Communication Technology, vol.311, pp.151-165, 2009. ,
DOI : 10.1007/978-3-642-04798-5_11
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-04798-5_11.pdf
Intrusion detection for resource-constrained embedded control systems in the power grid, International Journal of Critical Infrastructure Protection, vol.5, issue.2, pp.74-83, 2012. ,
A product machine model for anomaly detection of interposition attacks on cyber-physical systems, IFIP International Federation for Information Processing, vol.278, pp.285-299, 2008. ,
Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems, Proc. ACSAC 14, 2014. ,
Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems, International Journal of Critical Infrastructure Protection, vol.10, pp.59-70, 2015. ,
DOI : 10.1016/j.ijcip.2015.05.001
Statebased network intrusion detection systems for SCADA protocols: A proof of concept, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp.6027-138, 2010. ,
Modbus/ dnp3 state-based intrusion detection system, Advanced Information Networking and Applications (AINA), pp.729-736, 2010. ,
DOI : 10.1109/aina.2010.86
Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. Dependable and Secure Computing, IEEE Transactions on, vol.12, issue.1, pp.16-30, 2015. ,
DOI : 10.1109/tdsc.2014.2312327
Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems, IEEE Transactions on Smart Grid, vol.6, issue.6, pp.3104-3113, 2015. ,
DOI : 10.1109/tsg.2015.2409775
Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions, Smart Grid Communications (SmartGridComm), 2010. ,
DOI : 10.1109/smartgrid.2010.5622068
, First IEEE International Conference on, 2010.
Hybrid control network intrusion detection systems for automated power distribution systems, 44th Annual IEEE/IFIP International Conference on, pp.774-779, 2014. ,
DOI : 10.1109/dsn.2014.81
URL : http://www.cs.ucdavis.edu/~peisert/research/2014-TOSG-ADS.pdf
Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation, IEEE Trans. Systems, Man, and Cybernetics: Systems, vol.45, issue.10, pp.1345-1360, 2015. ,
Dependability Analysis of Networked Control Systems with Consideration of Shared Redundant Subsystems, 2008. ,
Effect of Element Initialization in Synchronous Networked control System to Control Quality, Reliability and Maintainability Annual Symposium, RAMS, pp.135-140, 2004. ,
Performance evaluation of control networks: Ethernet, ControlNet,and DeviceNet, IEEE Control Systems Magazine, vol.21, pp.66-83, 2001. ,
, , 1999.
Definition and modelling of the communication architecture for the control of a helicopter-drone, 8th IFAC Symposium on Cost Oriented Automation, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00167365
Experimental Networked Embedded Mini Drone-Part I. Consideration of Faults, pp.4332-4337, 2007. ,
DOI : 10.23919/ecc.2007.7068611
URL : https://hal.archives-ouvertes.fr/hal-00129457
A CAN Kingdom-Rev 3.01, KVASER AB, 1995. ,
, Cybersécurité des systèmes industriels, Cepadues, 2015.
Cyber security of the smart grid control systems: intrusion detection in IEC 61850 communication networks, 2017. ,
Information technology-Security techniques-Code of practice for information security controls, IEC, 2013. ,
Information technology-Security techniques-Information security risk management, IEC, 2018. ,