“…In the ICS domain, some papers already address the ICS security knowledge. However many of them do not cover the full scope of ICS security assessments (Oates et al, 2013;Schneider, Obermeier and Schlegl, 2015;Lemaire et al, 2015;Lemaire et al, 2014), and others focus on special applications of ICS like smart grids and critical infrastructures (Choraś et al, 2010a; Jarmakiewicz, Maslanka and Parobczak, 2015; Barnett and Crapo, 2011;Koster et al, 2009). Additionally some general papers, dealing with ICS, do not embrace (all) ICS requirements (Bouet and Israel, 2011;Choraś et al, 2010b).…”