A Survey of Research on Smart Grid Security, Network Computing and Information Security, ser. Communications in Computer and Information Science, pp.395-405 ,
DOI : 10.1007/978-3-642-35211-9_52
The Modbus Protocol Specification V1.1b3 ,
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids, IEEE Transactions on Smart Grid, vol.2, issue.4, pp.796-808, 2011. ,
DOI : 10.1109/TSG.2011.2159818
A Novel Security Scheme for the Smart Grid and SCADA Networks, Wireless Personal Communications, pp.1-13, 2013. ,
Cyber security in the Smart Grid: Survey and challenges, Computer Networks, vol.57, issue.5, pp.1344-1371, 2013. ,
DOI : 10.1016/j.comnet.2012.12.017
A survey of communication/networking in Smart Grids, Future Generation Computer Systems, vol.28, issue.2, 2012. ,
DOI : 10.1016/j.future.2011.04.014
The UML standard specification ,
Incremental Symbolic Conformance Testing from UML MARTE Sequence Diagrams: Railway Use Case, 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering, 2012. ,
DOI : 10.1109/HASE.2012.18
On Conformance Testing for Timed Systems, Proc. of Int. Conf. Formal Modeling and Analysis of Timed Systems (FORMATS), 2008. ,
DOI : 10.1007/978-3-540-85778-5_18
Timed Testing with TorX, Proc. of Int. Conf. Formal Methods Europe (FM, 2005. ,
DOI : 10.1007/11526841_13
Black-box time systems, Proc. of Int. SPIN Workshop Model Checking of Software, 2004. ,
Symbolic Execution Techniques for Test Purpose Definition, Proc. of Int. Conf. Testing of Software and Communicating Systems, pp.1-18, 2006. ,
DOI : 10.1007/11754008_1
URL : https://hal.archives-ouvertes.fr/hal-00342082
The Theory of Timed Automata, Proc. of REX Workshop the Real-Time: Theory in Practice, 1992. ,
On the security of public key protocols Information Theory, IEEE Transactions on, vol.29, issue.2, 1983. ,
Security Weaknesses Detection by Symbolic Analysis of Scenarios, 2014 21st Asia-Pacific Software Engineering Conference, pp.367-374, 2014. ,
DOI : 10.1109/APSEC.2014.61
Attack taxonomies for the Modbus protocols, International Journal of Critical Infrastructure Protection, vol.1, 2008. ,
DOI : 10.1016/j.ijcip.2008.08.003
Model-driven reverse engineering, IEEE Software, vol.21, issue.4, pp.45-53, 2004. ,
DOI : 10.1109/MS.2004.23
Reverse engineering: Journey from code to design, 2011 3rd International Conference on Electronics Computer Technology, pp.102-106, 2011. ,
DOI : 10.1109/ICECTECH.2011.5941966
Starting Model-Based Testing Based on Existing Test Cases Used for Model Creation, 2011 IEEE 11th International Conference on Computer and Information Technology, pp.320-327, 2011. ,
DOI : 10.1109/CIT.2011.99
Towards a Unified Penetration Testing Taxonomy, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp.811-812, 2012. ,
DOI : 10.1109/SocialCom-PASSAT.2012.65