A. Babay, J. Schultz, T. Tantillo, S. Beckley, E. Jordan et al., Deploying intrusion-tolerant scada for the power grid, 49th IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN), 2019.

N. Berthier and H. Marchand, Discrete Controller Synthesis for Infinite State Systems with ReaX, IEEE Int. Workshop on Discrete Event Systems WODES, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00974553

A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino et al., A multidimensional critical state analysis for detecting intrusions in SCADA systems, IEEE Trans. Industrial Informatics, vol.7, issue.2, 2011.

H. Debar, M. Dacier, and A. Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.805-822, 1999.

G. Delaval, É. Rutten, and H. Marchand, Integrating discrete controller synthesis into a reactive programming language compiler. Discrete Event Dynamic Systems, vol.23, pp.385-418, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00863286

G. Delaval, S. Mak-karé-gueye, É. Rutten, and N. Palma, Modular coordination of multiple autonomic managers, CBSE'14, Proc. of the 17th Int, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01006106

R. Jacob, J. Lesage, and J. Faure, Overview of discrete event systems opacity: Models, validation, and quantification, Annual Reviews in Control, vol.41, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01275244

X. Ji, S. Yin, and . Lafortune, Opacity enforcement by insertion functions under energy constraints, 14th IFAC Workshop on Discrete Event Systems, vol.51, pp.291-297, 2018.

M. Kabir-querrec, S. Mocanu, P. Bellemain, J. Thiriet, and E. Savary, Corrupted GOOSE Detectors: Anomaly Detection in Power Utility Real-Time Ethernet Communications, GreHack, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01237725

O. Koucham, S. Mocanu, G. Hiet, J. Thiriet, and F. Majorczyk, Detecting Process-Aware Attacks in Sequential Control Systems, NordSec, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01361081

R. Langner, To kill a centrifuge, 2013.

H. Marchand and M. Samaan, Incremental design of a power transformer station controller using a controller synthesis methodology, IEEE Trans. on Soft. Eng, vol.26, issue.8, pp.729-741, 2000.
URL : https://hal.archives-ouvertes.fr/hal-00546156

S. Mocanu, M. Puys, and T. , An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems, Journées C&ESAR Virtualisation et Cybersécurité, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02371133

P. J. Ramadge and W. M. Wonham, On the supervisory control of discrete event systems, Proc. IEEE, vol.77, issue.1, 1989.

K. A. Stouffer, J. Falco, and K. Scarfone, Guide to industrial control systems (ICS) security, 2015.

B. Yang and H. Hu, Secure conflicts avoidance in multidomain environments: A distributed approach, IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp.1-12, 2019.

B. X. Zhu, Resilient Control and Intrusion Detection for SCADA Systems, 2014.