M Cheminod 2009 Detecting chains of vulnerabilities in industrial networks IEEE Trans. Ind. Inform 5 2 181 193
M CheminodL DuranteA Valenzano 2013 Review of security issues in industrial networks IEEE Trans. Ind. Inform 9 1 277 293
I. C Bertolotti 2015 A twofold model for the analysis of access control policies in industrial networked systems Comput. Stand. Interfaces To appear
W GranzerF PrausW Kastner 2010 Security in building automation systems IEEE Trans. Ind. Electron 57 11 3622 3630
M Lin 2009 Static security optimization for real-time systems IEEE Trans. Ind. Inform 5 1 22 37
A LiuA Khakpour 2013 Quantifying and verifying reachability for access controlled networks IEEE/ACM Trans. Netw 21 2 551 565
Z MaP Smith 2013 Determining risks from advanced multi-step attacks to critical information infrastructures In: Proc. 8th International Workshop on Critical Information Infrastructures Security (CRITIS) 142 154
P MaggiD PozzaR Sisto 2008 Vulnerability modelling for the analysis of network attacks Proc. 3rd International Conference on Dependability of Computer Systems (DepCoSRELCOMEX) 15 22
MITRE Common vulnerabilities and exposures (CVE) Bedford, MA The MITRE Corporation Available from http://cve.mitre.org/
MITRE Open vulnerability and assessment language (OVAL) Bedford, MA The MITRE Corporation Available from http://oval.mitre.org/index.html
National Institute of Standards and Technology National vulnerability database (NVD) Available from http://nvd.nist.gov/
OSVDB Open source vulnerability database (OSVDB) Available from http://osvdb.org/
E ShakshukiN KangT Sheltami 2013 EAACK - A secure intrusion-detection system for MANETs IEEE Trans. Ind. Electron 60 3 1089 1098
R SufatrioH. C YapL Zhong 2004 A machine-oriented integrated vulnerability database for automated vulnerability detection and processing Proc. 18th USENIX Systems Administration Conference (LISA) Symantec. SecurityFocus Vulnerability Database 47 58 Available from http://www.securityfocus.com/vulnerabilities/