M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein et al., Understanding the mirai botnet, USENIX Security Symposium, 2017.

A. M. Rahmani, T. N. Gia, B. Negash, A. Anzanpour, I. Azimi et al., Exploiting smart e-health gateways at the edge of healthcare internet-of-things, Future Gener. Comput. Syst, vol.78, 2018.

, Anatomy of an attack, medjack (medical device attack), 2015.

B. Schneier, Secrets & Lies: Digital Security in a Networked World, 2000.

R. Milner, A Calculus of Communicating Systems, 1982.

, Reactive, generative, and stratified models of probabilistic processes, Information and Computation, vol.121

A. Basu, M. Bozga, and J. Sifakis, Modeling heterogeneous realtime components in BIP, Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006, pp.11-15, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00375298

S. Bensalem, M. Bozga, B. Delahaye, C. Jegourel, A. Legay et al., Statistical model checking qos properties of systems with sbip, Proceedings of the 5th International Conference on Leveraging Applications of Formal Methods, Verification and Validation: Technologies for, vol.Part I
URL : https://hal.archives-ouvertes.fr/hal-00847827

P. Johnson, R. Lagerstrom, M. Ekstedt, and U. Franke, Modeling and analyzing systems-of-systems in the multi-attribute prediction language (mapl), 2016 IEEE/ACM 4th International Workshop on Software Engineering for Systems-of-Systems (SESoS), pp.1-7, 2016.

T. Sommestad, M. Ekstedt, and H. Holm, The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures, IEEE Systems Journal, vol.7, issue.3, pp.363-373, 2013.

N. Ben-said, T. Abdellatif, S. Bensalem, and M. Bozga, Model-driven Information Flow Security for Component-Based Systems, From Programs to Systems. The Systems perspective in Computing-ETAPS Workshop, pp.1-20, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01212303

H. Holm, K. Shahzad, M. Buschle, and M. Ekstedt, P 2 cysemol: Predictive, probabilistic cyber security modeling language, IEEE Transactions on Dependable and Secure Computing, vol.12, issue.6, pp.626-639, 2015.

C. Jégourel, A. Legay, S. Sedwards, and L. Traonouez, Distributed verification of rare properties with lightweight importance splitting observers, CoRR, 2015.