A. Cardenas, S. Amin, Z. Lin, Y. Huang, C. Huang et al., Attacks against process control systems: Risk assessment, detection, and response, pp.355-366, 2011.

J. Slay and M. Miller, Lessons learned from the maroochy water breach, International Conference on Critical Infrastructure Protection, pp.73-82, 2007.

S. Mclaughlin, C. Konstantinou, X. Wang, L. Davi, A. Sadeghi et al., The cybersecurity landscape in industrial control systems, Proceedings of the IEEE, vol.104, issue.5, pp.1039-1057, 2016.

Y. Cherdantseva, P. Burnap, A. Blyth, P. Eden, and K. Jones, Hugh Soulsby, and Kristan Stoddart. A review of cyber security risk assessment methods for scada systems, Computers Security, vol.56, pp.1-27, 2016.

B. Miller and D. Rowe, A survey scada of and critical infrastructure incidents, vol.10, p.2012

F. Khorrami, P. Krishnamurthy, and R. Karri, Cybersecurity for control systems: A process-aware perspective, IEEE Design Test, vol.33, issue.5, pp.75-83, 2016.

A. A. Cárdenas, S. Amin, and S. Sastry, Research challenges for the security of control systems, Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC'08, vol.6, pp.1-6, 2008.

S. Amin, S. Litrico, A. Sastry, and . Bayen, Cyber security of water scada systems-part i: Analysis and experimentation of stealthy deception attacks, Control Systems Technology, vol.21, 1963.

F. Pasqualetti, F. Dörfler, and F. Bullo, Attack detection and identification in cyber-physical systems, IEEE Transactions on Automatic Control, vol.58, issue.11, pp.2715-2729, 2013.

M. Sid, S. Chitraganti, and K. Chabir, Special issue on analysis and synthesis of control systems over wireless digital channels, Journal of the Franklin Institute, vol.354, issue.9, pp.3678-3689, 2017.

S. Helem, D. Sánchez, T. Rotondo, V. Escobet, J. Puig et al., Detection of replay attacks in cyber-physical systems using a frequency-based signature, Journal of the Franklin Institute, vol.356, issue.5, pp.2798-2824, 2019.

F. Sicard, É. Zamai, and J. Flaus, Critical States Distance Filter Based Approach for Detection and Blockage of Cyberattacks in Industrial Control Systems, pp.117-145, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01741155

L. K. Carvalho, Y. Wu, R. Kwong, and S. Lafortune, Detection and mitigation of classes of attacks in supervisory control systems, Automatica, vol.97, pp.121-133, 2018.

B. Bouamama, R. Alaoui, P. Taillibert, and M. Staroswiecki, Diagnosis of a two-tank system, Intern Report of CHEM-project, 2001.

J. Quevedo, H. Sánchez, D. Rotondo, T. Escobet, and V. Puig, A two-tank benchmark for detection and isolation of cyber attacks, IFAC-PapersOnLine, vol.51, issue.24, pp.770-775, 2018.

M. Staroswiecki and G. Comtet-varga, Analytical redundancy relations for fault detection and isolation in algebraic dynamic systems, Automatica, vol.37, issue.5, pp.687-699, 2001.

A. Slimani, P. Ribot, E. Chanthery, and N. Rachedi, Fusion of Model-based and Data-based Fault Diagnosis Approaches, 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01882327

K. Tidriri and T. Tiplica, Nizar Chatti, and Sylvain Verron. A generic framework for decision fusion in fault detection and diagnosis. Engineering Applications of Artificial Intelligence, vol.71, pp.73-86, 2018.

J. Friedman, Regularized discriminant analysis, Journal of The American Statistical Association -J AMER STATIST ASSN, vol.84, pp.165-175, 1989.

T. Cover and P. Hart, Nearest neighbor pattern classification, IEEE Transactions on Information Theory, vol.13, issue.1, pp.21-27, 1967.

L. Breiman, J. Friedman, R. Olshen, and C. Stone, Classification and Regression Trees, 1984.