, Anatomy of an Attack, MEDJACK (Medical Device Attack), 2015.

M. Antonakakis, Understanding the mirai botnet, USENIX Security Symposium, 2017.

A. Basu, M. Bozga, and J. Sifakis, Modeling Heterogeneous Real-time Components in BIP, Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006, pp.11-15, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00375298

D. Beaulaton, A Language for Analyzing Security of IOT Systems
URL : https://hal.archives-ouvertes.fr/hal-01960860

D. Beaulaton, A Modeling Language for Security Threats of IoT Systems". In: Formal Methods for Industrial Critical Systems, pp.258-268, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01962080

S. Bensalem, Statistical Model Checking Qos Properties of Systems with SBIP, Proceedings of the 5th International Conference on Leveraging Applications of Formal Methods, Verification and Validation: Technologies for Mastering Change-Volume Part I, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00847827

B. Boyer, PLASMA-lab: A Flexible, Distributable Statistical Model Checking Library, Quantitative Evaluation of Systems, pp.978-981
URL : https://hal.archives-ouvertes.fr/hal-01088411

E. Smart, Hospitals, Security and Resilience for Smart Health Service and Infrastructures, 2016.

. Ylì-es-falcone, Runtime Verification of Component-Based Systems, Software Engineering and Formal Methods, pp.204-220, 2011.

S. Imene-ben-hafaiedh, S. Graf, and . Quinton, Building Distributed Controllers for Systems with Priorities, J. Log. Algebr. Program, vol.80, pp.194-218, 2011.

H. Holm, P 2 CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language, IEEE Transactions on Dependable and Secure Computing, vol.12, pp.1545-5971, 2015.
DOI : 10.1109/tdsc.2014.2382574

C. Jegourel, A. Legay, and S. Sedwards, Importance Splitting for Statistical Model Checking Rare Properties, Computer Aided Verification. Ed. by Natasha Sharygina and Helmut Veith, pp.978-981, 2013.
DOI : 10.1007/978-3-642-39799-8_38

URL : https://hal.archives-ouvertes.fr/hal-01087826

B. Klin and V. Sassone, Structural Operational Semantics for Stochastic and Weighted Transition Systems, Inf. Comput, vol.227, pp.58-83, 2013.
DOI : 10.1016/j.ic.2013.04.001

URL : https://doi.org/10.1016/j.ic.2013.04.001

B. Kordy, M. Pouly, and P. Schweitzer, Computational Aspects of Attack-Defense Trees, Security and Intelligent Information Systems, pp.103-116, 2012.

S. Mauw and M. Oostdijk, Foundations of Attack Trees, Proceedings of the 8th International Conference on Information Security and Cryptology. ICISC'05, pp.186-198, 2006.
DOI : 10.1007/11734727_17

R. Milner, A Calculus of Communicating Systems, 1982.

E. Ruijters, Rare Event Simulation for Dynamic Fault Trees, Computer Safety, Reliability, and Security, pp.978-981, 2017.
DOI : 10.1007/978-3-319-66266-4_2

T. Sommestad, M. Ekstedt, and H. Holm, The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures, IEEE Systems Journal, vol.7, issue.3, pp.1932-8184, 2013.

R. J. Vanglabbeek, S. A. Smolka, and B. Steffen, Reactive, Generative, and Stratified Models of Probabilistic Processes, Information and Computation, p.121, 1995.