A. Alemberti, M. Frogheri, and L. Mansani, The Lead fast reactor demonstrator (ALFRED) and ELFR design, Proceedings of the International Conference on Fast Reactors and Related Fuel Cycles: Safe Technologies and Sustainable Scenarios (FR 13), 2013.

S. Ali, S. B. Qaisar, H. Saeed, M. F. Khan, M. Naeem et al., Network challenges for cyber physical systems with tiny wireless devices: A case study on reliable pipeline condition monitoring, Sensors, vol.15, issue.4, pp.7172-7205, 2015.

T. Aven, Ignoring scenarios in risk assessments: Understanding the issue and improving current practice, Reliability Engineering & System Safety, vol.145, pp.215-220, 2016.

T. Aven and B. S. Krohn, A new perspective on how to understand, assess and manage risk and the unforeseen, Reliability Engineering & System Safety, vol.121, pp.1-10, 2014.

S. Backhaus, R. Bent, J. Bono, R. Lee, B. Tracey et al., Cyber-physical security: A game theory model of humans interacting over control systems, IEEE Transactions on Smart Grid, vol.4, issue.4, pp.2320-2327, 2013.

R. Beran and P. Hall, Interpolated nonparametric prediction intervals and confidence intervals, Journal of the Royal Statistical Society. Series B (Methodological), pp.643-652, 1993.

J. D. Boskvic and R. K. Mehra, Stable adaptive multiple model-based control design for accommodation of sensor failures, American Control Conference, vol.3, pp.2046-2051, 2002.

J. M. Bradley and E. M. Atkins, Optimization and control of cyber-physical vehicle systems, Sensors, vol.15, issue.9, pp.23020-23049, 2015.

D. Maio, F. Secchi, P. Vantini, S. Zio, and E. , Fuzzy C-means clustering of signal functional principal components for post-processing dynamic scenarios of a nuclear power plant digital instrumentation and control system, IEEE Transactions on Reliability, vol.60, issue.2, pp.415-425, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00609634

D. Maio, F. Bandini, A. Zio, E. Alberola, S. C. Sanchez-saez et al., Bootstrapped-ensemble-based Sensitivity Analysis of a trace thermalhydraulic model based on a limited number of PWR large break LOCA simulations, Reliability Engineering & System Safety, vol.153, pp.122-134, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01786975

D. Maio, F. Rai, A. Zio, and E. , A dynamic probabilistic safety margin characterization approach in support of Integrated Deterministic and Probabilistic Safety Analysis. Reliability Engineering & System Safety, assessment. Reliability Engineering & System Safety, vol.145, pp.122-138, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01786979

D. Ding, Z. Wang, Q. L. Han, and G. Wei, Security control for discrete-time stochastic nonlinear systems subject to deception attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2016.

, Dymola (Version, France: Dassault Systèmes, 2015.

B. Efron and R. Tibshirani, Bootstrap methods for standard errors, confidence intervals, and other measures of statistical accuracy, Statistical science, pp.54-75, 1986.

Y. Fang and G. Sansavini, Optimizing power system investments and resilience against attacks, Reliability Engineering & System Safety, vol.159, pp.161-173, 2017.

Z. Feng, G. Wen, and G. Hu, Distributed secure coordinated control for multiagent systems under strategic attacks, IEEE transactions on cybernetics, vol.47, issue.5, pp.1273-1284, 2017.

I. N. Fovino, M. Masera, and A. De-cian, Integrating cyber attacks within fault trees, Reliability Engineering & System Safety, vol.94, issue.9, pp.1394-1402, 2009.

P. Fritzson, Principles of object-oriented modeling and simulation with Modelica 2.1, 2010.

D. Grabaskas, M. Bucknor, A. Brunett, and M. Nakayama, Quantifying Safety Margin Using the Risk-Informed Safety Margin Characterization (RISMC), pp.26-30, 2015.

X. Hu, M. Xu, S. Xu, and P. Zhao, Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization, Reliability Engineering & System Safety, vol.159, pp.119-133, 2017.

Y. L. Huang, A. A. Cárdenas, S. Amin, Z. S. Lin, H. Y. Tsai et al., , p.83, 2009.

A. D. Hutson, Calculating nonparametric confidence intervals for quantiles using fractional order statistics, Journal of Applied Statistics, vol.26, issue.3, pp.343-353, 1999.

, Implementing Digital Instrumentation and Control Systems in the modernization of Nuclear Power Plants, IAEA, 2009.

K. Ingols, R. Lippmann, and K. Piwowarski, Practical attack graph generation for network defense, Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, pp.121-130, 2006.

S. K. Khaitan and J. D. Mccalley, Design techniques and applications of cyberphysical systems: A survey, IEEE Systems Journal, vol.9, issue.2, pp.350-365, 2015.

H. M. Khalid and J. C. Peng, A Bayesian Algorithm to Enhance the Resilience of WAMS Applications Against Cyber Attacks, IEEE Transactions on Smart Grid, vol.7, issue.4, pp.2026-2037, 2016.

K. D. Kim and P. R. Kumar, Cyber-physical systems: A perspective at the centennial, Proceedings of the IEEE, vol.100, pp.1287-1308, 2012.

A. J. Kornecki and M. Liu, Fault tree analysis for safety/security verification in aviation software, Electronics, vol.2, issue.1, pp.41-56, 2013.

S. Kriaa, L. Pietre-cambacedes, M. Bouissou, and Y. Halgand, A survey of approaches combining safety and security for industrial control systems, Reliability Engineering & System Safety, vol.139, pp.156-178, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01222958

E. A. Lee, Cyber physical systems: Design challenges, Object Oriented Real-Time Distributed Computing (ISORC), pp.363-369, 2008.

E. L. Lehmann and G. Casella, Theory of point estimation, 2006.

K. Liu, V. C. Lee, J. K. Ng, J. Chen, and S. H. Son, Temporal data ACCEPTED MANUSCRIPT vehicular cyber-physical systems, IEEE Transactions on Intelligent Transportation Systems, vol.15, issue.6, pp.2419-2431, 2014.

M. A. Mcqueen, W. F. Boyer, M. A. Flynn, and G. A. Beitel, Quantitative cyber risk reduction estimation methodology for a small SCADA control system, System Sciences, 2006. HICSS'06. Proceedings of the, p.39, 2006.

, Annual Hawaii International Conference on, vol.9, pp.226-226

R. Mitchell and R. Chen, Effect of intrusion detection and response on reliability of cyber physical systems, IEEE Transactions on Reliability, vol.62, issue.1, pp.199-210, 2013.

S. Ntalampiras, Automatic identification of integrity attacks in cyber-physical systems, Expert Systems with Applications, vol.58, pp.164-173, 2016.

W. T. Nutt and G. B. Wallis, Evaluation of nuclear safety from the outputs of computer codes in the presence of uncertainties, Reliability Engineering & System Safety, vol.83, issue.1, pp.57-77, 2004.

V. Paelke and C. Röcker, User interfaces for cyber-physical systems: challenges and possible approaches, International Conference of Design, User Experience, and Usability, pp.75-85, 2015.

F. Pasqualetti, F. Dörfler, and F. Bullo, Attack detection and identification in cyber-physical systems, IEEE Transactions on Automatic Control, vol.58, issue.11, pp.2715-2729, 2013.

E. Paté-cornell, Finding and fixing systems weaknesses: Probabilistic methods and applications of engineering risk analysis, Risk Analysis, vol.22, issue.2, pp.319-334, 2002.

E. Paté-cornell, On "Black Swans" and "Perfect Storms": risk analysis and management when statistics are not enough, Risk analysis, vol.32, issue.11, pp.1823-1833, 2012.

L. Piètre-cambacédès and M. Bouissou, Cross-fertilization between safety and security engineering, Reliability Engineering & System Safety, vol.110, pp.110-126, 2013.

R. Ponciroli, A. Bigoni, A. Cammi, S. Lorenzi, and L. Luzzi, Object-oriented modelling and simulation for the ALFRED dynamics, pp.15-29, 2014.

R. Ponciroli, A. Cammi, A. Della-bona, S. Lorenzi, and L. Luzzi, Development of the ALFRED reactor full power mode control system, Progress in Nuclear Energy, vol.85, pp.428-440, 2015.

M. S. Rahman, M. A. Mahmud, A. M. Oo, and H. R. Pota, Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems, IEEE Transactions on Industrial Informatics, pp.1-10, 2016.

F. Sanchez-saez, A. I. Sánchez, J. F. Villanueva, S. Carlos, and S. Martorell, Uncertainty analysis of a LBLOCA in a PWR nuclear power plant using TRACE with Wilks as compared to other non-parametric methods, 2017.

T. J. Santner, B. J. Williams, and W. I. Notz, The design and analysis of computer experiments, 2013.

B. Schneier, Attack trees. Dr. Dobb's journal, vol.24, pp.21-29, 1999.

O. Sheyner and J. Wing, Tools for generating and analyzing attack graphs, International Symposium on Formal Methods for Components and Objects, pp.344-371, 2003.

T. W. Simpson, J. D. Poplinski, P. N. Koch, and J. K. Allen, Metamodels for computer-based engineering design: survey and recommendations, Engineering with computers, vol.17, issue.2, pp.129-150, 2001.

S. Skogestad and I. Postlethwaite, Multivariable feedback control: analysis and design, vol.2, 2007.

P. Turati, N. Pedroni, and E. Zio, An adaptive simulation framework for the exploration of extreme and unexpected events in dynamic engineered systems, Risk analysis, vol.37, issue.1, pp.147-159, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01652286

P. Turati, N. Pedroni, and E. Zio, Simulation-based exploration of highdimensional system models for identifying unexpected events, Reliability Engineering & System Safety, vol.165, pp.317-330, 2017.

A. Wald, An extension of Wilks' method for setting tolerance limits, The Annals of Mathematical Statistics, vol.14, issue.1, pp.45-55, 1943.

W. Wang, F. Di-maio, and E. Zio, Hybrid Fuzzy-PID Control of a Cyber-Physical System Working Under Varying Environmental Conditions, Nuclear Engineering and Design, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01786586

W. Wang, F. Di-maio, and E. Zio, Three-Loop Monte Carlo Simulation Approach to Multi-State Physics Modeling for System Reliability Assessment, Reliability Engineering & System Safety, vol.167, pp.276-289, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01652211

W. Wang, F. Di-maio, and E. Zio, A Non-Parametric Cumulative Sum Approach for Online Diagnostics of Cyber Attacks to Nuclear Power Plants. Resilience of Cyber-Physical Systems: From Risk Modelling to Threat Counteraction, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02428562

S. S. Wilks, Determination of sample sizes for setting tolerance limits, The Annals of Mathematical Statistics, vol.12, issue.1, pp.91-96, 1941.

S. S. Wilks, Statistical prediction with special reference to the problem of tolerance limits. The annals of mathematical statistics, vol.13, pp.400-409, 1942.

Y. Xiang, L. Wang, and N. Liu, Coordinated attacks on electric power systems in a cyber-physical environment, vol.149, pp.156-168, 2017.

Y. Xiang, L. Wang, and Y. Zhang, Adequacy evaluation of electric power grids considering substation cyber vulnerabilities, International Journal of Electrical Power & Energy Systems, vol.96, pp.368-379, 2018.

W. Yuan, L. Zhao, and B. Zeng, Optimal power grid protection through a defender-attacker-defender model, Reliability Engineering & System Safety, vol.121, pp.83-89, 2014.

Y. Yuan, H. Yuan, L. Guo, H. Yang, and S. Sun, Resilient control of networked control system under DoS attacks: A unified game approach, IEEE Transactions on Industrial Informatics, vol.12, issue.5, pp.1786-1794, 2016.

J. Zalewski, I. A. Buckley, B. Czejdo, S. Drager, A. J. Kornecki et al., A Framework for Measuring Security as a System Property in, 2016.

, Cyberphysical Systems. Information, vol.7, issue.2, p.33

H. Zhang, P. Cheng, L. Shi, and J. Chen, Optimal DoS attack scheduling in wireless networked control system, IEEE Transactions on Control Systems Technology, vol.24, issue.3, pp.843-852, 2016.

M. Zhu and S. Martínez, On the performance analysis of resilient networked control systems under replay attacks, IEEE Transactions on Automatic Control, vol.59, issue.3, pp.804-808, 2014.

Z. Zeng and E. Zio, An integrated modeling framework for quantitative business continuity assessment, Process Safety and Environmental Protection, vol.106, pp.76-88, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01632276

E. Zio, F. Di-maio, S. Martorell, and Y. Nebot, Neural networks and order statistics for quantifying nuclear power plants safety margins, Proceedings, European Safety & Reliability Conference (ESREL), 2008.

E. Zio, The Monte Carlo simulation method for system reliability and risk analysis, vol.39, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00777141

E. Zio, Challenges in the vulnerability and risk analysis of critical infrastructures, Reliability Engineering & System Safety, vol.152, pp.137-150, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01787020

E. Zio and F. Di-maio, Processing dynamic scenarios from a reliability analysis of a nuclear power plant digital instrumentation and control system, Annals of Nuclear Energy, vol.36, issue.9, pp.1386-1399, 2009.

E. Zio, F. Di-maio, and J. Tong, Safety margins confidence estimation for a passive residual heat removal system, Reliability Engineering & System Safety, vol.95, issue.8, pp.828-836, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00610473