Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, pp.2347-2376, 2015. ,
DOI : 10.1109/COMST.2015.2444095
Attitudes and Perceptions of IoT Security in Critical Societal Services, IEEE Access, vol.4, pp.2130-2138, 2016. ,
DOI : 10.1109/ACCESS.2016.2560919
The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010. ,
DOI : 10.1016/j.comnet.2010.05.010
Controller Synthesis for Probabilistic Systems, Proc. of the 3rd Int. Conf. on Theoretical Computer Science, TCS, pp.493-506, 2004. ,
Roberto Speicys Cardoso, and Valérie Issarny. 2015. A Unifying Perspective on Protocol Mediation: Interoperability in the Future Internet, J. of Internet Services and Applications, vol.6, issue.12, pp.1-1215, 2015. ,
Requirements-driven mediation for collaborative security, Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014, pp.37-42, 2014. ,
DOI : 10.1145/2593929.2593938
URL : https://hal.archives-ouvertes.fr/hal-00955562
Automated Synthesis of Mediators to Support Component Interoperability, IEEE Transactions on Software Engineering, vol.41, issue.3, pp.221-240, 2015. ,
DOI : 10.1109/TSE.2014.2364844
URL : https://hal.archives-ouvertes.fr/hal-01076176
Requirements Prioritization, Engineering and Managing Software Requirements, AybükeAyb¨Aybüke Aurum and Claes Wohlin, pp.69-94, 2005. ,
DOI : 10.1007/3-540-28244-0_4
Robots Everywhere!. In Computing Research That Changed the World: Reflections and Perspectives, CRASS '09, 2009. ,
Reasoning about Human Participation, 2015. ,
Satisfying requirements for pervasive service compositions, Proceedings of the 7th Workshop on Models@run.time, MRT '12, pp.17-22, 2012. ,
DOI : 10.1145/2422518.2422522
URL : https://hal.archives-ouvertes.fr/hal-00733346
Prospects for the Internet of Things, XRDS, vol.22, issue.2, pp.28-31, 2015. ,
Software Engineering for Self-Adaptive Systems: A Research Roadmap, Softw. Eng. for Self-Adaptive Syst. [outcome of a Dagstuhl Seminar, pp.1-26, 2009. ,
Formal methods: state of the art and future directions, ACM Computing Surveys, vol.28, issue.4, pp.626-643, 1996. ,
DOI : 10.1145/242223.242257
URL : https://hal.archives-ouvertes.fr/hal-00444076
A text-based approach to feature modelling: Syntax and semantics of TVL, Science of Computer Programming, vol.76, issue.12, pp.12-1130, 2011. ,
DOI : 10.1016/j.scico.2010.10.005
URL : https://hal.archives-ouvertes.fr/hal-00718291
Featured Transition Systems: Foundations for Verifying Variability-Intensive Systems and Their Application to LTL Model Checking, IEEE Transactions on Software Engineering, vol.39, issue.8, pp.1069-1089, 2013. ,
DOI : 10.1109/TSE.2012.86
Threat implications of the Internet of Things, Cyber Conflict (CyCon), 2013 5th Intl. Conf. on, pp.1-12, 2013. ,
Nir Piterman, and Sebastí an Uchitel. 2013. Synthesizing nonanomalous event-based controllers for liveness goals, ACM Trans. Softw. Eng. Methodol, vol.22, p.1, 2013. ,
Generalized Rabin(1) Synthesis with Applications to Robust System Synthesis, Proc. of NASA Formal Methods -Third Int. Symp., NFM, pp.101-115, 2011. ,
DOI : 10.1145/1755952.1755968
Incrementally synthesizing controllers from scenario-based product line specifications, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, pp.433-443, 2013. ,
DOI : 10.1145/2491411.2491445
Security Requirements Engineering: A Framework for Representation and Analysis, IEEE Transactions on Software Engineering, vol.34, issue.1, p.1, 2008. ,
DOI : 10.1109/TSE.2007.70754
HyperCat -Home, 2016. ,
Automatic synthesis of modular connectors via composition of protocol mediation patterns, 2013 35th International Conference on Software Engineering (ICSE), pp.3-12, 2013. ,
DOI : 10.1109/ICSE.2013.6606546
Deriving specifications from requirements, Proceedings of the 17th international conference on Software engineering , ICSE '95, pp.15-24, 1995. ,
DOI : 10.1145/225014.225016
UPnP Design by Example :A Software Designer's Guide to Universal Plug and Play, 2003. ,
Featureoriented domain analysis (FODA) feasibility study, 1990. ,
Reducibility among combinatorial problems, Proc. of a Symp. on the Complexity of Computer Computations, pp.85-103, 1972. ,
Formal verification of parallel programs, Communications of the ACM, vol.19, issue.7, pp.371-384, 1976. ,
DOI : 10.1145/360248.360251
Requirements modelling by synthesis of deontic input-output automata, 2013 35th International Conference on Software Engineering (ICSE), pp.592-601, 2013. ,
DOI : 10.1109/ICSE.2013.6606605
Formalizing correctness criteria of dynamic updates derived from specification changes, Proc. of the 8th Int. Symp. on Softw. Eng. for Adaptive and Self-Managing Syst., SEAMS, pp.63-72, 2013. ,
Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques, IEEE Transactions on Software Engineering, vol.38, issue.4, pp.755-777, 2012. ,
DOI : 10.1109/TSE.2011.62
URL : https://hal.archives-ouvertes.fr/inria-00341598
Collaborative Security, ACM Computing Surveys, vol.48, issue.1, 2015. ,
DOI : 10.1145/2785733
Matching and Merging of Variant Feature Specifications, IEEE Transactions on Software Engineering, vol.38, issue.6, pp.1355-1375, 2012. ,
DOI : 10.1109/TSE.2011.112
The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.46-57, 1977. ,
DOI : 10.1109/SFCS.1977.32
On the synthesis of a reactive module, Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '89, pp.179-190, 1989. ,
DOI : 10.1145/75277.75293
On re-assembling self-managed components, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.727-733, 2015. ,
DOI : 10.1109/INM.2015.7140362
Handbook of constraint programming, 2006. ,
Requirementsdriven adaptive security: Protecting variable assets at runtime, Proc. of the 20th IEEE Int. Req. Eng. Conf., RE, pp.111-120, 2012. ,
Security, privacy and trust in Internet of Things: The road ahead, Computer Networks, vol.76, pp.146-164, 2015. ,
DOI : 10.1016/j.comnet.2014.11.008
Considering Defense in Depth for Software Applications, IEEE Security & Privacy, vol.2, issue.1, pp.72-75, 2004. ,
The process mediation framework for semantic web services, International Journal of Agent-Oriented Software Engineering, vol.3, issue.1, pp.27-58, 2009. ,
DOI : 10.1504/IJAOSE.2009.022945
Gartner Says a Typical Family Home Could Contain More Than 500 Smart Devices by 2022, p.2839717, 2014. ,
Requirements engineering, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, 2009. ,
DOI : 10.1145/1453101.1453133
Protecting Your Home From Afar With a Robot. The New York Times, Online, issue.11, 2010. ,
Physical security devices for computer subsystems: A survey of attacks and defenses, Int. Workshop on Cryptographic Hardware and Embedded Syst, pp.302-317, 2000. ,
Mediators in the architecture of future information systems, Computer, vol.25, issue.3, pp.38-49, 1992. ,
DOI : 10.1109/2.121508
Protocol Specifications and Component Adaptors, ACM Trans. on Programming Languages and System, TOPLAS, vol.19, issue.2, pp.292-333, 1997. ,
Automated analysis of security requirements through risk-based argumentation, Journal of Systems and Software, vol.106, pp.102-116, 2015. ,
DOI : 10.1016/j.jss.2015.04.065
A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4, pp.4-17, 2014. ,
DOI : 10.1145/2555611
QoS-Aware Middleware for Web Services Composition, IEEE Trans. Softw. Eng, vol.30, pp.5-311, 2004. ,