Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. Dependable Secure Comput, vol.1, issue.1, pp.11-33, 2004. ,
Safety and security interdependencies in complex systems and SoS: Challenges and perspectives, Complex Systems Design & Management, pp.229-241, 2012. ,
A survey of approaches combining safety and security for industrial control systems, Reliab. Eng. Syst. Saf, vol.139, pp.156-178, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01222958
A Model Based Approach for SCADA Safety and Security joint Modeling: S-cube, IET System Safety and Cyber Security, 2015. ,
Joint safety and security modeling for risk assessment in cyber physical systems, 2016. ,
URL : https://hal.archives-ouvertes.fr/tel-01318118
CySeMoL: A tool for cyber security analysis of enterprises, 22nd International Conference and Exhibition on, pp.1-4, 2013. ,
MulVAL: A Logic-based Network Security Analyzer, USENIX security, 2005. ,
Automatic Verification of Correspondences for Security Protocols, J. Od Comput. Secur, vol.17, issue.4, pp.363-434, 2009. ,
Knowledge modeling and reliability processing: presentation of the FIGARO language and of associated tools, proceedings of SAFECOMP 91, 1991. ,
AltaRica 3.0: a Model-Based approach for Safety Analyses, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02063678
The Architecture Analysis & Design Language (AADL): An Introduction, 2006. ,
A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes, Reliab. Eng. Syst. Saf, vol.82, issue.2, pp.149-163, 2003. ,
Comparison of the modeling languages AltaRica and Figaro, proceedings of the 14th congress on reliability and maintenability (IMDR), 2006. ,
Performing Safety Analyses with AADL and AltaRica, International Symposium on Model-Based Safety and Assessment, pp.67-81, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01707373
A Reference Model For Computer Integrated Manufacturing (CIM) A Description from the Viewpoint of Industrial Automation, 1989. ,
Cyber Security of Industrial Control System Why ICS specificity lead to Cyber Security Challenge?, C&ESAR, 2013. ,
, Enterprise Control System Integration --Part 1: Models and terminology, International Electrotechnical Commission, 2013.
SecureUML: A UML-Based Modeling Language for Model-Driven Security, ?UML? 2002 -The Unified Modeling Language, pp.426-441, 2002. ,
Safety and Security Interactions Modeling Using the BDMP Formalism: Case Study of a Pipeline, Computer Safety, Reliability, and Security, vol.8666, pp.326-341, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01222959
, Ethical Hacking and Countermeasures (CEH v7.1)
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures, Int. J. Crit. Infrastruct. Prot, vol.10, pp.3-17, 2015. ,
Common cause failures in safety-instrumented systems: Using field experience from the petroleum industry, Reliab. Eng. Syst. Saf, vol.151, pp.34-45, 2016. ,
Procedures for Treating Common Cause Failures in Safety and Reliability Studies, Electric Power Research Inst ,
, , vol.2, 1988.
Common Cause Failures in Discrete Dynamic Models: Theory and Applications in the Figaro Modelling Language, proceedings of the 25th European Safety and Reliability Conference (ESREL), 2015. ,
A complete guide to the common vulnerability scoring system version 2.0," in Published by FIRST-Forum of Incident Response and Security Teams, pp.1-23, 2007. ,
Software Security, Privacy, and Dependability: Metrics and Measurement, IEEE Softw, vol.33, issue.4, pp.46-54, 2016. ,
A quantitative model of the security intrusion process based on attacker behavior, Softw. Eng. IEEE Trans. On, vol.23, issue.4, pp.235-245, 1997. ,
A Large-Scale Study of the Time Required to Compromise a Computer System, IEEE Trans. Dependable Secure Comput, vol.11, issue.1, pp.2-15, 2014. ,
Time-to-compromise model for cyber risk reduction estimation, Quality of Protection, pp.49-64, 2006. ,
, Processus stochastiques et fiabilité des systèmes, 1997.
, CVE details (The ultimate security vulnerability datasource)
Automated dependability analysis of complex systems with the KB3 workbench: the experience of EDF R&D, Proceedings of the International Conference on ENERGY and ENVIRONMENT, CIEM 2005, 2005. ,
Laplace Transform Inversion and Passage-Time Distributions in Markov Processes, J. Appl. Probab, vol.27, issue.1, pp.74-87, 1990. ,
A simple yet efficient acceleration technique for Monte Carlo simulation, The 22nd annual European Safety and Reliability Conference ESREL, 2013. ,
Inconsistency detection in KB3 tools, 2002. ,