Model- Driven Dependability Assessment of Software Systems, 2013. ,
DOI : 10.1007/978-3-642-39512-3
Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE, 2014. ,
Risk management guide for information technology systems, Nist special publication, vol.800, issue.30, pp.800-830, 2002. ,
DOI : 10.6028/NIST.SP.800-30
URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA396553&Location=U2&doc=GetTRDoc.pdf
Introduction to the OCTAVE Approach, 2003. ,
DOI : 10.21236/ADA634134
URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a634134.pdf
19 Papyrus: A UML2 Tool for Domain-Specific Language Modeling, Model-Based Engineering of Embedded Real-Time Systems, pp.361-368, 2011. ,
DOI : 10.1007/978-3-642-16277-0_19
The SINARI project: security analysis and risk assessment applied to the electrical distribution network, 22nd International Conference and Exhibition on Electricity Distribution (CIRED 2013), 2013. ,
DOI : 10.1049/cp.2013.1025
URL : https://hal.archives-ouvertes.fr/hal-00991386
A decade of model-driven security, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.1-10, 2011. ,
DOI : 10.1145/1998441.1998443
Supporting the verification of compliance to safety standards via model-driven engineering: Approach, tool-support and empirical validation, Information and Software Technology, vol.55, issue.5, pp.55-836, 2013. ,
DOI : 10.1016/j.infsof.2012.11.009
Model-based security analysis in seven steps ??? a guided tour to the CORAS method, BT Technology Journal, vol.24, issue.12, pp.101-117, 2007. ,
DOI : 10.4018/jcit.2005070107
A Survey of Information Security Risk Analysis Methods, The Smart Computing Review, vol.2, issue.1, pp.79-94, 2012. ,
DOI : 10.6029/smartcr.2012.01.007
URL : https://doi.org/10.6029/smartcr.2012.01.007
Towards model-driven safety analysis, 2011 3rd International Workshop on Dependable Control of Discrete Systems, pp.53-58, 2011. ,
DOI : 10.1109/DCDS.2011.5970318
Attack Trees, Dr. Dobb's Journal, vol.12, issue.24, pp.21-29, 1999. ,
DOI : 10.1002/9781119183631.ch21
ISRAM: information security risk analysis method, Computers & Security, vol.24, issue.2, pp.147-169, 2005. ,
DOI : 10.1016/j.cose.2004.07.004
Vulnerability Assessment of Cybersecurity for SCADA Systems, IEEE Transactions on Power Systems, vol.23, issue.4, pp.1836-1846, 2008. ,
DOI : 10.1109/TPWRS.2008.2002298
Threat modeling using Attack trees, J. Comput. Small Coll, vol.23, issue.4, pp.124-131, 2008. ,
RobotML, a Domain-Specific Language to Design, Simulate and Deploy Robotic Applications, Simulation, Modeling, and Programming for Autonomous Robots, pp.149-160, 2012. ,
DOI : 10.1007/978-3-642-34327-8_16
URL : https://hal.archives-ouvertes.fr/hal-00995125
EBIOS-Expression des Besoins et Identification des Objectifs de Sécurité, Méthode de Gestion des risques, 2010. ,
The RISC Project, http://risc.sec4scada.com/ National Institute of Standards and Technology (2014). Systems Security Engineering, An Integral Approach to Building Trustworthy Resilient Systems, NIST Special Publication, pp.800-160, 2013. ,