J. R. Voir, . Lindsay, . Tipping, and . Scales, The Attribution Problem and the Feasibility of Deterrence against Cyberattack, Journal of Cybersecurity, vol.1, issue.1, pp.53-67, 2015.

. Voir, Global Cybersecurity Summit 2017, qui s'est tenu à Kiev en Ukraine

A. Guiton and . Enquête, Les cobayes de la cyberguerre

A. Références and «. , Computer Security at Nuclear Facilities », Security Series No. 17: Technical Guidance Reference Manual, 2011.

. Bsa-/-the-software-alliance, Tableau de bord de la cybersécurité dans l'UE : Vers un cyberespace europe?en se?curise?, 2015.

R. Fallon and M. Et-lazaroff, NERC Increasing Penalties for Fundamentally Failing to Comply with Cyber Standards, 2016.

T. Gomart, « Trump, un an après. Un monde à l'état de nature ?, 2017.

J. R. Lindsay, . Tipping, and . Scales, The Attribution Problem and the Feasibility of Deterrence against Cyberattack, Journal of Cybersecurity, vol.1, issue.1, 2015.

. Parlement-européen, Direction générale des politiques internes de l'Union, Cyber Security Strategy for the Energy Sector ? Study for the Industry, 2016.

M. Ruhle and L. Et-trakimavicius, « Cyberattacks Are the New Challenge for Renewable Energy, POLITICO, pp.23-2017

D. Shea, « State Efforts to Protect the Electric Grid, National Conference of State Legislatures, 2016.