A. Stubblefield, A. D. Rubin, and W. S. Dan, Managing the Performance Impact of Web Security, Electronic Commerce Research, vol.5, issue.1, p.99116, 2005.
DOI : 10.1023/B:ELEC.0000045975.59531.08

N. Sklavos, P. Kitsos, K. Papadopoulos, and O. Koufopavlou, Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security, The Journal of Supercomputing, vol.24, issue.1, pp.33-50, 2006.
DOI : 10.1007/s11227-006-3549-4

B. Ksiezopolski, Z. Kotulski, and P. Szalachowski, Adaptive Approach to Network Security, Communications in Computer and Information Science, vol.14, issue.3, pp.233-241, 2009.
DOI : 10.1016/j.cose.2004.11.002

B. Ksiezopolski, Z. Kotulski, and P. Szalachowski, On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems " ; European Teletraffic Seminar, pp.195-202, 2011.

J. Jürjens, Security and Compliance in Clouds " ; IT-Compliance, 4th Pan-European Conference, 2011.

B. Ksiezopolski, D. Rusinek, and A. Wierzbicki, On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML), Annales UMCS, Informatica, vol.12, issue.4, pp.69-81, 2012.
DOI : 10.2478/v10065-012-0032-0

B. Ksiezopolski, D. Rusinek, and A. Wierzbicki, On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML), QoP-ML) Lecture Notes in Computer Science, vol.7804, pp.261-270, 2013.
DOI : 10.1007/978-3-642-36818-9_27

URL : https://hal.archives-ouvertes.fr/hal-01480233

C. Lambrinoudakis, S. Gritzalis, F. Dridi, and G. Pernul, Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy, Computer Communications, vol.26, issue.16, pp.1873-1883, 2003.
DOI : 10.1016/S0140-3664(03)00082-3

B. Ksiezopolski, QoP-ML: Quality of Protection modelling language for cryptographic protocols " ; Computers & Security, pp.569-596

B. Ksiezopolski, Multilevel Modeling of Secure Systems in QoP, pp.1-256, 2015.
DOI : 10.1201/b18579

B. Ksiezopolski, T. Zurek, and M. Mokkas, Quality of Protection Evaluation of Security Mechanisms, The Scientific World Journal, vol.135, 2014.
DOI : 10.1016/S0004-3702(96)00041-0

V. Blanco, P. Gonzalez, J. C. Cabaleiro, D. B. Heras, T. F. Pena et al., : visualizing the performance prediction of parallel iterative solvers, Future Generation Computer Systems, vol.19, issue.5, pp.721-733, 2003.
DOI : 10.1016/S0167-739X(02)00180-2

L. Vigano, Automated Security Protocol Analysis With the AVISPA Tool, Electronic Notes in Theoretical Computer Science, vol.155, pp.61-86, 2006.
DOI : 10.1016/j.entcs.2005.11.052

B. Blanchet and A. Chaudhuri, Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.417-431, 2008.
DOI : 10.1109/SP.2008.12

J. Jürjens, Tools for secure systems development with UML, International Journal on Software Tools for Technology Transfer, vol.10, issue.1, pp.527-544, 2007.
DOI : 10.1007/s10009-007-0048-8

S. Yuyama, Fundamental Aspects of Acoustic Emission Applications to the Problems Caused by Corrosion " ; Corrosion Monitoring in Industrial Plants Using Nondestructive Testing and Electrochemical Methods, American Society for Testing and Materials, pp.43-74, 1986.

M. Elbatanouny, J. Mangual, P. Ziehl, and F. Matta, Early Corrosion Detection in Prestressed Concrete Girders Using Acoustic Emission, Journal of Materials in Civil Engineering, vol.26, issue.3, pp.2014-504511
DOI : 10.1061/(ASCE)MT.1943-5533.0000845

T. Rault, A. Bouabdallah, and Y. Challal, Energy efficiency in wireless sensor networks: A top-down survey, Computer Networks, vol.67, pp.104-122, 2014.
DOI : 10.1016/j.comnet.2014.03.027

URL : https://hal.archives-ouvertes.fr/hal-01009386

G. M. Wojcik, Electrical parameters influence on the dynamics of the hodgkinhuxley liquid state machine, Neurocomputing, vol.79, p.6878, 2012.

G. M. Wojcik and J. A. Garcia-lazaro, Analysis of the neural hypercolumn in parallel PCSIM simulations, Procedia Computer Science, vol.1, issue.1, pp.845-854, 2010.
DOI : 10.1016/j.procs.2010.04.092

I. Mansour, D. Rusinek, G. Chalhoub, P. Lafourcade, and B. Ksiezopolski, Multihop Node Authentication Mechanisms for Wireless Sensor Networks, Ad-hoc, Mobile, and Wireless Networks, 2014.
DOI : 10.1007/978-3-319-07425-2_30