A. Shameli-sendi, R. Aghababaei-barzegar, and M. Cheriet, Taxonomy of information security risk assessment (ISRA), Computers & Security, vol.57, pp.14-30, 2015.
DOI : 10.1016/j.cose.2015.11.001

M. Bielecki and G. Quirchmayr, A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results, 2010 International Conference on Availability, Reliability and Security, pp.696-701, 2010.
DOI : 10.1109/ARES.2010.25

E. Cayirci and R. Ghergherehchi, Modeling cyber attacks and their effects on decision process, Proceedings of the 2011 Winter Simulation Conference (WSC), 2011.
DOI : 10.1109/WSC.2011.6147970

URL : http://www.informs-sim.org/wsc11papers/236.pdf

I. Kotenko and A. , Chechulin A Cyber Attack Modeling and Impact Assessment Framework, 5th International Conference on Cyber Conflict, 2013.

I. Kotenko and E. Doynikova, Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics, 2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, 2015.
DOI : 10.1109/PDP.2015.34

G. Gonzalez-granadillo, J. Garcia-alfaro, and H. Debar, Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks, Conference on Security and Privacy in Communication Networks, pp.538-555, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01332277

G. Gonzalez-granadillo, J. Rubio-hernan, J. Garcia-alfaro, and H. Debar, Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms, 2016 IEEE Trustcom/BigDataSE/ISPA, 2016.
DOI : 10.1109/TrustCom.2016.0082

G. Gonzalez-granadillo, G. Jacob, and H. Debar, Attack Volume Model: Geometrical Approach and Application, 10th International Conference on Risks and Security of Internet and Systems (Crisis), pp.242-257, 2015.

G. Gonzalez-granadillo, J. Garcia-alfaro, and H. Debar, An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events, 11th Conference on Risks and Security of Internet and Systems, 2016.
DOI : 10.1109/ICBDA.2016.7509823

URL : https://hal.archives-ouvertes.fr/hal-01487752

G. Gonzalez-granadillo, J. Garcia-alfaro, and H. Debar, A polytope-based approach to measure the impact of events against critical infrastructures, Journal of Computer and System Sciences, vol.83, issue.1, pp.3-21, 2016.
DOI : 10.1016/j.jcss.2016.02.004

URL : https://hal.archives-ouvertes.fr/hal-01453253

G. Gonzalez-granadillo, M. Belhaouane, H. Debar, and G. Jacob, RORI-based countermeasure selection using the OrBAC formalism, International Journal of Information Security, vol.12, issue.4, pp.63-79, 2014.
DOI : 10.1109/INTECH.2012.6457801

URL : https://hal.archives-ouvertes.fr/hal-01274857

G. Gonzalez-granadillo, J. Garcia-alfaro, E. Alvarez, M. El-barbori, and H. Debar, Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index, Computers & Electrical Engineering, vol.47, pp.13-34, 2015.
DOI : 10.1016/j.compeleceng.2015.07.023

URL : https://hal.archives-ouvertes.fr/hal-01255033

G. Gonzalez-granadillo, A. Motzek, J. Garcia-alfaro, and H. Debar, Selection of Mitigation Actions Based on Financial and Operational Impact Assessments, Conference on Availability, Reliability and Security, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01450193

M. Kolomeets, A. Chechulin, and I. Kotenko, Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams, Cross-Domain Conference, and Workshop on Privacy Aware Machine Learning for Health Data Science, 2016.
DOI : 10.1142/8685

URL : https://hal.archives-ouvertes.fr/hal-01635003

E. V. Doynikova and I. V. Kotenko, Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management, International Conference on Risks and Security of Internet and Systems, pp.107-124, 2016.
DOI : 10.1007/978-3-319-31811-0_7

M. V. Kolomeec, A. A. Chechulin, and I. V. Kotenko, ?????????? ???????????????????????????????? ???????????????????? ?????? ???????????????????? ???????????????????? ???????????? ???????????????????????? ????????????, SPIIRAS Proceedings, vol.5, issue.42, pp.60-84, 2015.
DOI : 10.15622/sp.42.12

M. Kolomeec, G. Gonzalez-granadillo, E. Doynikova, A. Chechulin, I. Kotenko et al., Choosing Models for Security Metrics Visualization, 7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security MMM-ACNS, 2017.
DOI : 10.1109/SMARTGRID.2010.5622049

URL : https://hal.archives-ouvertes.fr/hal-01648050

K. Gordon and M. Dion, Protection of Critical Infrastructure and the role of investment policies relating to National Security Whitepaper, 2008.

R. Rajkumar, I. Lee, L. Sha, and J. Stankovic, Cyber-physical systems, Proceedings of the 47th Design Automation Conference on, DAC '10, pp.731-736, 2010.
DOI : 10.1145/1837274.1837461

B. Genge, I. Kiss, and P. , A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures, International Journal of Critical Infrastructure Protection, vol.10, pp.3-17, 2015.
DOI : 10.1016/j.ijcip.2015.04.001

S. Associates, Electricity Distribution System Losses, Non Technical Overview, 2009.

L. Coppolino, S. D. Antonio, V. Formicola, and L. Romano, Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study, International Conference on Computer Safety, Reliability, and Security SAFECOMP, pp.199-212, 2011.
DOI : 10.1109/LATINCOM.2009.5305052

J. P. Sammon and R. J. Caverly, Transportation Systems: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan, Homeland security dept, 2007.

D. Turner, M. Schroeck, R. Shockley, and A. , The real-world use of big data in financial services, Executive Report IBM Institute for Business Value in collaboration with Sa¨?dSa¨?d Business School, 2013.

L. Sha, S. Gopalakrishnan, X. Liu, and Q. Wang, Cyber-Physical Systems: A New Frontier, International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.1-9, 2008.
DOI : 10.1007/978-0-387-88735-7_1

URL : http://www.cs.mcgill.ca/~xueliu/publications/2008_SUTC.pdf

K. Condello, A. Ozment, and C. Durkovich, Communications Sector- Specific Plan, An Annex to the NIPP 2013 Homeland security dept, 2015.

T. L. Norman, Risk Analysis and Security Countermeasure Selection, 2010.
DOI : 10.1201/9781420078718

M. Howard, J. Pincus, and J. M. Wing, Measuring Relative Attack Surfaces, Computer Security in the 21st Century, pp.109-137, 2005.
DOI : 10.1007/0-387-24006-3_8

URL : http://www-2.cs.cmu.edu/afs/cs/usr/wing/www/publications/Howard-Wing05.pdf

P. K. Manadhata and J. M. Wing, An Attack Surface Metric, IEEE Transactions on Software Engineering, 2010.
DOI : 10.21236/ada457096

URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a457096.pdf

A. Noureldien, A novel taxonomy of MANET attacks, 2015 International Conference on Electrical and Information Technologies (ICEIT), 2015.
DOI : 10.1109/EITech.2015.7162947

A. Abbas, A. E. Saddik, and A. Miri, A Comprehensive Approach to Designing Internet Security Taxonomy, 2006 Canadian Conference on Electrical and Computer Engineering, pp.1316-1319, 2006.
DOI : 10.1109/CCECE.2006.277393

N. Li and M. Tripunitara, Security analysis in role-based access control, ACM Transactions on Information and System Security, vol.9, issue.4, pp.391-420, 2006.
DOI : 10.1145/1187441.1187442

URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2005-02.pdf

F. Cuppens and N. , Cuppens-Boulahia, and A. Miege, Modelling contexts in the or-bac model, 2003.

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008.
DOI : 10.1109/2.485845

URL : https://hal.archives-ouvertes.fr/hal-01207773

R. Gerhards and A. Gmbh, The Syslog Protocol, Network Working Group, 2009.
DOI : 10.17487/rfc5424

H. Debar, D. Curry, and B. Feinstein, The Intrusion Detection Message Exchange Format (IDMEF), p.4765, 2007.
DOI : 10.17487/rfc4765

L. Krautsevich, F. Martinelli, and A. Yautsiukhin, Towards modelling adaptive attacker's behaviour. FPS Symposium, pp.357-364, 2013.
DOI : 10.1007/978-3-642-37119-6_23

L. Krautsevich and A. Yautsiukhin, Evaluation of Adaptive Attacker Models, ESSoS Doctoral Symposium, 2014.

P. Mell, K. Scarfone, and S. Romanosky, Common Vulnerability Scoring System Version 2.0 " , Specification Document, 2007.
DOI : 10.1109/msp.2006.145

D. Shinder, Scenes of the cybercrime. Computer forensics handbook, 2002.

M. Libicki, Brandishing Cyberattack Capabilities. National Defense Research Institute, white paper, 2013.

R. Danyliw, J. Meijer, and Y. Demchenko, The Incident Object Description Exchange Format (IODEF), p.5070, 2007.
DOI : 10.17487/rfc5070

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc5070.txt.pdf

A. Federation and . Scientists, Special Operations Forces Intelligence and Electronic Warfare Operations Appendix D: Target Analysis Process, Available at, 1991.

K. Harrison and G. White, A Taxonomy of Cyber Events Affecting Communities, 2011 44th Hawaii International Conference on System Sciences, 2011.
DOI : 10.1109/HICSS.2011.37

B. Zhu, A. Joseph, and S. Sastry, A Taxonomy of Cyber Attacks on SCADA Systems, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, 2011.
DOI : 10.1109/iThings/CPSCom.2011.34

S. S. Lagu and S. B. , Deshmukh Raspberry Pi for Automation of Water Treatment Plant, International Conference on Computing Communication Control and Automation (ICCUBEA), pp.532-536, 2015.

S. Y. Nam, D. Kim, and J. , Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks, IEEE Communications Letters, vol.14, issue.2, pp.187-189, 2010.
DOI : 10.1109/LCOMM.2010.02.092108

A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, A secure control framework for resource-limited adversaries, Automatica, vol.51, pp.135-148, 2015.
DOI : 10.1016/j.automatica.2014.10.067

URL : http://arxiv.org/pdf/1212.0226