A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. Dependable Secure Comput, vol.1, issue.1, pp.11-33, 2004.

S. Sadvandi, N. Chapon, and L. Pietre-cambacédes, Safety and security interdependencies in complex systems and SoS: Challenges and perspectives, Complex Systems Design & Management, pp.229-241, 2012.

S. Kriaa, L. Pietre-cambacedes, M. Bouissou, and Y. Halgand, A survey of approaches combining safety and security for industrial control systems, Reliab. Eng. Syst. Saf, vol.139, pp.156-178, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01222958

S. Kriaa, M. Bouissou, and Y. Laarouchi, A Model Based Approach for SCADA Safety and Security joint Modeling: S-cube, IET System Safety and Cyber Security, 2015.

S. Kriaa, Joint safety and security modeling for risk assessment in cyber physical systems, 2016.
URL : https://hal.archives-ouvertes.fr/tel-01318118

H. Holm, T. Sommestad, M. Ekstedt, and L. Nordstörm, CySeMoL: A tool for cyber security analysis of enterprises, 22nd International Conference and Exhibition on, pp.1-4, 2013.

X. Ou, S. Govindavajhala, and A. W. Appel, MulVAL: A Logic-based Network Security Analyzer, USENIX security, 2005.

B. Blanchet, Automatic Verification of Correspondences for Security Protocols, J. Od Comput. Secur, vol.17, issue.4, pp.363-434, 2009.

M. Bouissou, H. Bouhadana, M. Bannelier, and N. Vilatte, Knowledge modeling and reliability processing: presentation of the FIGARO language and of associated tools, proceedings of SAFECOMP 91, 1991.

T. Prosvirnova, AltaRica 3.0: a Model-Based approach for Safety Analyses, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02063678

P. H. Feiler, D. P. Gluch, and J. J. Hudak, The Architecture Analysis & Design Language (AADL): An Introduction, 2006.

M. Bouissou and J. Bon, A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes, Reliab. Eng. Syst. Saf, vol.82, issue.2, pp.149-163, 2003.

M. Bouissou and C. Seguin, Comparison of the modeling languages AltaRica and Figaro, proceedings of the 14th congress on reliability and maintenability (IMDR), 2006.

J. Brunel, Performing Safety Analyses with AADL and AltaRica, International Symposium on Model-Based Safety and Assessment, pp.67-81, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01707373

J. T. Williams, A Reference Model For Computer Integrated Manufacturing (CIM) A Description from the Viewpoint of Industrial Automation, 1989.

J. Brun, L. Platel, and F. Tea, Cyber Security of Industrial Control System Why ICS specificity lead to Cyber Security Challenge?, C&ESAR, 2013.

, Enterprise Control System Integration --Part 1: Models and terminology, International Electrotechnical Commission, 2013.

T. Lodderstedt, D. Basin, and J. Doser, SecureUML: A UML-Based Modeling Language for Model-Driven Security, ?UML? 2002 -The Unified Modeling Language, pp.426-441, 2002.

S. Kriaa, M. Bouissou, F. Colin, Y. Halgand, and L. Pietre-cambacedes, Safety and Security Interactions Modeling Using the BDMP Formalism: Case Study of a Pipeline, Computer Safety, Reliability, and Security, vol.8666, pp.326-341, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01222959

. Ec-council, Ethical Hacking and Countermeasures (CEH v7.1)

B. Genge, I. Kiss, and P. Haller, A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures, Int. J. Crit. Infrastruct. Prot, vol.10, pp.3-17, 2015.

S. Hauge, P. Hokstad, S. Håbrekke, and M. A. Lundteigen, Common cause failures in safety-instrumented systems: Using field experience from the petroleum industry, Reliab. Eng. Syst. Saf, vol.151, pp.34-45, 2016.

A. Mosleh, K. N. Fleming, G. W. Parry, H. M. Paula, D. H. Worledge et al., Procedures for Treating Common Cause Failures in Safety and Reliability Studies, Electric Power Research Inst

L. Pickard and I. Garrick, , vol.2, 1988.

R. Donat and M. Bouissou, Common Cause Failures in Discrete Dynamic Models: Theory and Applications in the Figaro Modelling Language, proceedings of the 25th European Safety and Reliability Conference (ESREL), 2015.

P. Mell, K. Scarfone, and S. Romanosky, A complete guide to the common vulnerability scoring system version 2.0," in Published by FIRST-Forum of Incident Response and Security Teams, pp.1-23, 2007.

G. Hatzivasilis, I. Papaefstathiou, and C. Manifavas, Software Security, Privacy, and Dependability: Metrics and Measurement, IEEE Softw, vol.33, issue.4, pp.46-54, 2016.

E. Jonsson and T. Olovsson, A quantitative model of the security intrusion process based on attacker behavior, Softw. Eng. IEEE Trans. On, vol.23, issue.4, pp.235-245, 1997.

H. Holm, A Large-Scale Study of the Time Required to Compromise a Computer System, IEEE Trans. Dependable Secure Comput, vol.11, issue.1, pp.2-15, 2014.

M. A. Mcqueen, W. F. Boyer, M. A. Flynn, and G. A. Beitel, Time-to-compromise model for cyber risk reduction estimation, Quality of Protection, pp.49-64, 2006.

C. Cocozza-thivent, Processus stochastiques et fiabilité des systèmes, 1997.

, CVE details (The ultimate security vulnerability datasource)

M. Bouissou, Automated dependability analysis of complex systems with the KB3 workbench: the experience of EDF R&D, Proceedings of the International Conference on ENERGY and ENVIRONMENT, CIEM 2005, 2005.

P. G. Harrison, Laplace Transform Inversion and Passage-Time Distributions in Markov Processes, J. Appl. Probab, vol.27, issue.1, pp.74-87, 1990.

M. Bouissou, A simple yet efficient acceleration technique for Monte Carlo simulation, The 22nd annual European Safety and Reliability Conference ESREL, 2013.

M. Bouissou and J. Houdebine, Inconsistency detection in KB3 tools, 2002.