K. Delaney and E. Levy, Connected Futures Cisco Research : IoT Value : Challenges, Breakthroughs, and Best Practices, Cisco System Report, 2017.

M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein et al., Understanding the Mirai Botnet, Proceedings of the USENIX Security Symposium, pp.1092-1110, 2017.

E. Bertino and N. Islam, Botnets and Internet of Things Security, Computer, vol.50, issue.02, pp.76-79, 2017.

C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, DDoS in the IoT: Mirai and Other Botnets, vol.50, pp.80-84, 2017.

L. Rouch, J. François, F. Beck, and A. Lahmadi, A Universal Controller to Take Over a Z-Wave Network, Proceedings of Black Hat Europe, pp.1-9, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01684569

Z. Zhang, M. C. Cho, C. Wang, C. Hsu, C. Chen et al., IoT Security: Ongoing Challenges and Research Opportunities, Proceedings of the 7th International Conference on Service-Oriented Computing and Applications (ICSOC 2014), pp.230-234, 2014.

B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin et al., A Data Driven Approach for the Science of Cyber Security: Challenges and Directions, Proceedings of the 17th International Conference on Information Reuse and Integration, pp.1-10, 2016.

J. B. Fraley and J. Cannady, The Promise of Machine Learning in Cybersecurity, Proceedings of the IEEE SoutheastCon Conference, pp.1-6, 2017.

W. Aalst and . Van-der, Process mining : Discovery, Conformance and Enhancement of Business Processes, 2011.

A. Bassi, M. Bauer, M. Fiedler, T. Kramp, R. V. Kranenburg et al., Enabling Things to Talk: Designing IoT Solutions with the IoT Architectural Reference Model, 2013.

M. Pahl and L. Donini, Securing iot microservices with certificates, Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2018), pp.1-5, 2018.

P. Holgado, V. A. Villagrá, and L. Vázquez, Real-time multistep attack prediction based on hidden markov models, IEEE Transactions on Dependable and Secure Computing, vol.17, issue.1, pp.134-147, 2020.

A. Mayzaud, R. Badonnel, and I. Chrisment, A Taxonomy of Attacks in RPL-based Internet of Things, International Journal of Network Security, vol.18, issue.3, pp.459-473, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01207859

A. Sehgal, A. Mayzaud, R. Badonnel, I. Chrisment, and J. Schönwälder, Addressing DODAG Inconsistency Attacks in RPL Networks, Proceedings of the Global Information Infrastructure and Networking Symposium (GIIS 2014), pp.1-8, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01090986

M. S. Mahdavinejad, M. Rezvan, M. Barekatain, P. Adibi, P. Barnaghi et al., Machine Learning for Internet of Things Data Analysis: a Survey, Digital Communications and Networks, vol.4, issue.3, pp.161-175, 2018.

D. S. Terzi, R. Terzi, and S. Sagiroglu, Big Data Analytics for Network Anomaly Detection from Netflow Data, Proceedings of the International Conference on Computer Science and Engineering, pp.592-597, 2017.

S. Chauhan and L. Vig, Anomaly Detection in ECG Time Signals via Deep Long Short-term Memory Networks, Proceedings of the International Conference on Data Science and Advanced Analytics, pp.1-7, 2015.

W. Van-der-aalst, A. Bolt, S. Iriondo, and . Van-zelst, RapidProM : Mine your Processes and not just your Data, 2018.

F. Bezerra, J. Wainer, and W. M. Aalst, Anomaly Detection Using Process Mining, vol.29, pp.149-161, 2009.

W. Es-soufi, E. Yahia, and L. Roucoules, On the use of Process Mining and Machine Learning to Support Decision Making in Systems Design, Proceedings of the 13th IFIP International Conference on Product Lifecycle Management (PLM 2016), ser. Product Lifecycle Management for Digital Transformation of Industries, pp.56-66, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01403073

A. Ukil, S. Bandyoapdhyay, C. Puri, and A. Pal, IoT Healthcare Analytics: The Importance of Anomaly Detection, Proceedings of the 30th International Conference on Advanced Information Networking and Applications (AINA 2016), pp.994-997, 2016.

S. J. Leemans, D. Fahland, and W. M. Van-der-aalst, Scalable Process Discovery with Guarantees, Enterprise, Business-Process and Information Systems, pp.85-101, 2015.

S. Lloyd, Least Squares Quantization in PCM, IEEE Transactions on Information Theory, vol.28, issue.2, pp.129-137, 1982.

T. Zhang, R. Ramakrishnan, and M. Livny, BIRCH: An Efficient Data Clustering Method for Very Large Databases, Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 1996), pp.103-114, 1996.

M. Ester, H. Kriegel, J. Sander, and X. Xu, A Densitybased Algorithm for Discovering Clusters a Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise, Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, pp.226-231, 1996.

M. Zaman and C. Lung, Evaluation of Machine Learning Techniques for Network Intrusion Detection, Proceedings of the IEEE/IFIP International Network Operations and Management Symposium (NOMS 2018), pp.1-5, 2018.