A. Key, , pp.2018-2024

M. Antonakakis, Understanding the mirai botnet, 26th USENIX Security Symposium, 2017.

A. Basu, M. Bozga, and J. Sifakis, Modeling Heterogeneous Real-time Components in BIP, 4th SEFM Conference, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00375298

D. Beaulaton, A Language for Analyzing Security of IOT Systems, 13th SOSE Conference, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01960860

S. Bensalem, Statistical Model Checking Qos Properties of Systems with SBIP, 5th ISoLA Conference, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00847827

B. Boyer, PLASMA-lab: A Flexible, Distributable Statistical Model Checking Library, QEST Conference, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01088411

R. Van-glabbeek, S. Smolka, and B. Steffen, Reactive, Generative, and Stratified Models of Probabilistic Processes, Information and Computation, vol.121, p.1, 1995.

S. Graf, Distributed Implementation of Constrained Systems Based on Knowledge, 13th ISPDC Conference, 2014.

S. Graf and S. Quinton, Knowledge for the Distributed Implementation of Constrained Systems, In: Softw. Syst. Model, vol.15, 2013.

S. Imene-ben-hafaiedh, S. Graf, and . Quinton, Building Distributed Controllers for Systems with Priorities, J. Log. Algebr. Program, vol.80, pp.194-218, 2011.

R. Milner, A Calculus of Communicating Systems, 1982.

J. Sifakis, A Framework for Component-based Construction Extended Abstract, 3th SEFM Conference, 2005.

, Anatomy of an Attack, MEDJACK (Medical Device Attack), 2015.