Deploying intrusion-tolerant scada for the power grid, 49th IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN), 2019. ,
Discrete Controller Synthesis for Infinite State Systems with ReaX, IEEE Int. Workshop on Discrete Event Systems WODES, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00974553
A multidimensional critical state analysis for detecting intrusions in SCADA systems, IEEE Trans. Industrial Informatics, vol.7, issue.2, 2011. ,
Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.805-822, 1999. ,
Integrating discrete controller synthesis into a reactive programming language compiler. Discrete Event Dynamic Systems, vol.23, pp.385-418, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00863286
Modular coordination of multiple autonomic managers, CBSE'14, Proc. of the 17th Int, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01006106
Overview of discrete event systems opacity: Models, validation, and quantification, Annual Reviews in Control, vol.41, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01275244
Opacity enforcement by insertion functions under energy constraints, 14th IFAC Workshop on Discrete Event Systems, vol.51, pp.291-297, 2018. ,
Corrupted GOOSE Detectors: Anomaly Detection in Power Utility Real-Time Ethernet Communications, GreHack, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01237725
Detecting Process-Aware Attacks in Sequential Control Systems, NordSec, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01361081
To kill a centrifuge, 2013. ,
Incremental design of a power transformer station controller using a controller synthesis methodology, IEEE Trans. on Soft. Eng, vol.26, issue.8, pp.729-741, 2000. ,
URL : https://hal.archives-ouvertes.fr/hal-00546156
An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems, Journées C&ESAR Virtualisation et Cybersécurité, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02371133
On the supervisory control of discrete event systems, Proc. IEEE, vol.77, issue.1, 1989. ,
Guide to industrial control systems (ICS) security, 2015. ,
Secure conflicts avoidance in multidomain environments: A distributed approach, IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp.1-12, 2019. ,
Resilient Control and Intrusion Detection for SCADA Systems, 2014. ,