S. Bernardi, J. Merseguer, and D. C. Petriu, Model- Driven Dependability Assessment of Software Systems, 2013.
DOI : 10.1007/978-3-642-39512-3

S. Bran and S. Gérard, Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE, 2014.

G. Stoneburner, A. Goguen, and A. Feringa, Risk management guide for information technology systems, Nist special publication, vol.800, issue.30, pp.800-830, 2002.
DOI : 10.6028/NIST.SP.800-30

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA396553&Location=U2&doc=GetTRDoc.pdf

C. Alberts, A. Dorofee, J. Stevens, and C. Woody, Introduction to the OCTAVE Approach, 2003.
DOI : 10.21236/ADA634134

URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a634134.pdf

S. Gérard, C. Dumoulin, P. Tessier, and B. Selic, 19 Papyrus: A UML2 Tool for Domain-Specific Language Modeling, Model-Based Engineering of Embedded Real-Time Systems, pp.361-368, 2011.
DOI : 10.1007/978-3-642-16277-0_19

J. Mcdonald, H. Decroix, R. Caire, J. Sanchez, S. Chollet et al., The SINARI project: security analysis and risk assessment applied to the electrical distribution network, 22nd International Conference and Exhibition on Electricity Distribution (CIRED 2013), 2013.
DOI : 10.1049/cp.2013.1025

URL : https://hal.archives-ouvertes.fr/hal-00991386

D. Basin, M. Clavel, and M. Egea, A decade of model-driven security, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.1-10, 2011.
DOI : 10.1145/1998441.1998443

R. K. Panesar-walawege, M. Sabetzadeh, and L. Briand, Supporting the verification of compliance to safety standards via model-driven engineering: Approach, tool-support and empirical validation, Information and Software Technology, vol.55, issue.5, pp.55-836, 2013.
DOI : 10.1016/j.infsof.2012.11.009

F. Den-braber, I. Hogganvik, M. S. Lund, K. Stølen, and F. Vraalsen, Model-based security analysis in seven steps ??? a guided tour to the CORAS method, BT Technology Journal, vol.24, issue.12, pp.101-117, 2007.
DOI : 10.4018/jcit.2005070107

A. Behnia, R. A. Rashid, and J. A. Chaudhry, A Survey of Information Security Risk Analysis Methods, The Smart Computing Review, vol.2, issue.1, pp.79-94, 2012.
DOI : 10.6029/smartcr.2012.01.007

URL : https://doi.org/10.6029/smartcr.2012.01.007

M. Gudemann and F. Ortmeier, Towards model-driven safety analysis, 2011 3rd International Workshop on Dependable Control of Discrete Systems, pp.53-58, 2011.
DOI : 10.1109/DCDS.2011.5970318

B. Schneier, Attack Trees, Dr. Dobb's Journal, vol.12, issue.24, pp.21-29, 1999.
DOI : 10.1002/9781119183631.ch21

B. Karabacaka and I. Songukpinar, ISRAM: information security risk analysis method, Computers & Security, vol.24, issue.2, pp.147-169, 2005.
DOI : 10.1016/j.cose.2004.07.004

C. W. Ten, C. C. Liu, and G. Manimaran, Vulnerability Assessment of Cybersecurity for SCADA Systems, IEEE Transactions on Power Systems, vol.23, issue.4, pp.1836-1846, 2008.
DOI : 10.1109/TPWRS.2008.2002298

V. Saini, Q. Duan, and V. Paruchuri, Threat modeling using Attack trees, J. Comput. Small Coll, vol.23, issue.4, pp.124-131, 2008.

S. Dhouib, S. Kchir, S. Stinckwich, T. Ziadi, and M. Ziane, RobotML, a Domain-Specific Language to Design, Simulate and Deploy Robotic Applications, Simulation, Modeling, and Programming for Autonomous Robots, pp.149-160, 2012.
DOI : 10.1007/978-3-642-34327-8_16

URL : https://hal.archives-ouvertes.fr/hal-00995125

S. Général-de-la-défense-nationale, EBIOS-Expression des Besoins et Identification des Objectifs de Sécurité, Méthode de Gestion des risques, 2010.

R. The, The RISC Project, http://risc.sec4scada.com/ National Institute of Standards and Technology (2014). Systems Security Engineering, An Integral Approach to Building Trustworthy Resilient Systems, NIST Special Publication, pp.800-160, 2013.