M AbramsJ Weiss 2008 Malicious control system cyber security attack case study– Maroochy water services Australia
ANSI/ISA-62443-3-3 (99.03.03) 2013 Security for industrial automation and control systems part 3-3: System security requirements and security levels
B Bogaerts 2012 The IDP framework reference manual
ENISA 2011 Protecting industrial control systems: Recommendations for Europe and member states
N FalliereL Murchu, and E Chien 2011 W32.Stuxnet Dossier
M. D Ford 2013 Implementing the ADVISE security modeling formalism in Möbius 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 1 8
ISO/IEC 21827 2008 Information technology – security techniques – systems security engineering – capability maturity model (SSECMM) Geneva, Switzerland
S Jajodia 2011 Cauldron mission-centric cyber situational awareness with defense in depth Military Communications Conference 2011-MILCOM 2011 1339 1344
R Langner 2013 To kill a centrifuge: A technical analysis of what stuxnets creators tried to achieve
L Lemaire 2014 A SysML extension for security analysis of industrial control systems Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 1 9
E LeMay 2011 Model-based security metrics using adversary view security evaluation (ADVISE) 2011 Eighth International Conference on IEEE Quantitative Evaluation of Systems (QEST) 191 200
A Matrosov 2011 Stuxnet under the microscope
R OatesF ThomG Herries 2013 Security-aware, model-based systems engineering with SysML Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 78
X OuS GovindavajhalaA. W Appel 2005 MulVAL: A logic-based network security analyzer In USENIX security
G. J PaiD. J Bechta 2002 Automatic synthesis of dynamic fault trees from UML system models In:ISSRE 2003 Proceedings 13th IEEE International Symposium on Software Reliability Engineering 243–254
T SommestadM EkstedtH Holm 2013 The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures IEEE Syst. J 7 3 363 373
T SommestadM EkstedtL Nordström 2010 A case study applying the cyber security modeling language
K Stouffer 2015 Guide to industrial control systems (ICS) security
S TomD Christiansen, and D Berrett 2008 Recommended practice for patch management of control systems
J WittocxM MariënM Denecker 2008 The IDP system: A model expansion system for an extension of classical logic In: Proceedings of the 2nd Workshop on Logic and Search 153 165