Understanding the mirai botnet, USENIX Security Symposium, 2017. ,
Exploiting smart e-health gateways at the edge of healthcare internet-of-things, Future Gener. Comput. Syst, vol.78, 2018. ,
, Anatomy of an attack, medjack (medical device attack), 2015.
, Secrets & Lies: Digital Security in a Networked World, 2000.
A Calculus of Communicating Systems, 1982. ,
, Reactive, generative, and stratified models of probabilistic processes, Information and Computation, vol.121
Modeling heterogeneous realtime components in BIP, Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006, pp.11-15, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00375298
Statistical model checking qos properties of systems with sbip, Proceedings of the 5th International Conference on Leveraging Applications of Formal Methods, Verification and Validation: Technologies for, vol.Part I ,
URL : https://hal.archives-ouvertes.fr/hal-00847827
Modeling and analyzing systems-of-systems in the multi-attribute prediction language (mapl), 2016 IEEE/ACM 4th International Workshop on Software Engineering for Systems-of-Systems (SESoS), pp.1-7, 2016. ,
The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures, IEEE Systems Journal, vol.7, issue.3, pp.363-373, 2013. ,
Model-driven Information Flow Security for Component-Based Systems, From Programs to Systems. The Systems perspective in Computing-ETAPS Workshop, pp.1-20, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01212303
P 2 cysemol: Predictive, probabilistic cyber security modeling language, IEEE Transactions on Dependable and Secure Computing, vol.12, issue.6, pp.626-639, 2015. ,
Distributed verification of rare properties with lightweight importance splitting observers, CoRR, 2015. ,