H. AbdoM. KaoukJ.-M. FlausF. Masse 2018 A safety/security risk analysis approach of industrial control systems: A cyber bowtie combining new version of attack tree with bowtie analysis Computers and Security 72 175 195
A. ArghavaniM. ArghavaniM. AhmadiP. Crane 2018 Attacker-manager game tree (amgt): A new framework for visualizing and analysing the interactions between attacker and network security manager Computer Networks 133 42 58
S. BistarelliF. FioravantiP. Peretti 2006 April Defense trees for economic evaluation of security investments First International Conference on Availability, Reliability and Security (ARES’06)
E. J. ByresM. FranzD. Miller 2004 The use of attack trees in assessing vulnerabilities in scada systems Proceedings of the international infrastructure survivability workshop
W. Depamelaere 2018 Javafx tool for attack trees in cps https://github.com/WouterDep/attacktrees
K. EdgeR. RainesM. GrimailaR. Baldwin 2007 The use of attack and protection trees to analyze security for an online banking system Proceedings of the 40th Hawaii International Conference on System Sciences
ENISA 2016 December Communication network dependencies for ICS/SCADA Systems
S. FriedenthalA. MooreR. Steiner 2014 A practical guide to SysML: the systems modeling language Morgan Kaufmann
ICS-CERT 2011 May Common Cybersecurity Vulnerabilities in Industrial Control Systems
ICS-CERT 2014 CSET: Cyber security evaluation tool http://ics-cert.us-cert.gov/Assessments
X. JiH. YuG. FanW. Fu 2016 Attack-defense trees based cyber security analysis for cpss Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2016 17th IEEE/ACIS International Conference on 693 698 IEEE
M. KolomeecG. Gonzalez-GranadilloE. DoynikovaA. ChechulinI. KotenkoH. Debar 2017 Choosing models for security metrics visualization Computer Network Security 75 87 Springer
B. KordyS. MauwS. RadomiroviP. Schweitzer 2011 Foundations of attack-defense trees Formal Aspects of Security and Trust 80 95
L. LemaireJ. LaponB. De DeckerV. Naessens 2014 A SysML extension for security analysis of industrial control systems Proceedings of the 2Nd International Symposium on ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014 1 9 BCS
L. LemaireJ. VossaertJ. JansenV. Naessens 2015 Extracting vulnerabilities in industrial control systems using a knowledge-based system Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, ICSCSR ’15 1 10 BCS
E. LeMayM. D. FordK. KeefeW. H. SandersC. Muehrcke 2011 Model-based security metrics using adversary view security evaluation (advise) Quantitative Evaluation of Systems (QEST), 2011 Eighth International Conference on 191 200 IEEE
S. MauwM. Oostdijk 2005 Foundations of attack trees International Conference on Information Security and Cryptology 186 198 Springer
S. McKennaD. StaheliC. FulcherM. Meyer 2016 6 Bubblenet: A cyber security dashboard for visualizing patterns Computer Graphics Forum 35 3 281 290
A. RoyD. S. KimK. S. Trivedi 2012 August Attack countermeasure trees (act): Towards unifying the constructs of attack and defense trees Sec. and Commun. Netw. 5 8 929 943
B. Schneier 1999 Attack trees Dr. Dobbs journal 24 12 21 29
T. SommestadM. EkstedtH. Holm 2013 The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures Systems Journal IEEE 7 363 373
K. StoufferS. LightmanV. PillitteriM. AbramsA. Hahn 2015 Guide to industrial control systems (ics) security
C.-W. TenC.-C. LiuM. Govindarasu 2007 Vulnerability assessment of cybersecurity for scada systems using attack trees Power Engineering Society General Meeting, 2007 IEEE 1 8 IEEE
A. H. VuN. O. TippenhauerB. ChenD. M. NicolZ. Kalbarczyk 2014 Cybersage: a tool for automatic security assessment of cyber-physical systems International Conference on Quantitative Evaluation of Systems 384 387 Springer
J. WittocxM. MariënM. Denecker 2008 The idp system: a model expansion system for an extension of classical logic Proceedings of the 2nd Workshop on Logic and Search 153 165
S. A. ZonouzH. KhuranaW. H. SandersT. M. Yardley 2009 June A game-theoretic intrusion response and recovery engine 2009 IEEE/IFIP International Conference on Dependable Systems Networks 439 448