S. Büttner, The Design Space of Augmented and Virtual Reality Applications for Assistive Environments in Manufacturing: A Visual Approach, International Conference on PErvasive Technologies Related to Assistive Environments, pp.433-440, 2017.

L. Stuchlíková, P. Kósa, P. Benko, and . Juhász, Virtual reality vs. reality in engineering education, 15th International Conference on Emerging eLearning Technologies and Applications, pp.1-6, 2017.

. Dw and . Carruth, Virtual reality for education and workforce training, 15th International Conference on Emerging eLearning Technologies and Applications, pp.1-6, 2017.

J. Ryoo, A. Techatassanasoontorn, and D. Lee, Security Education using Second Life, IEEE Security and Privacy, 2009.

A. Ryoo, D. Techatassanasoontorn, J. Lee, and . Lothian, Game based InfoSec education using OpenSim, 15th Colloquium for Information Systems Security Education, 2011.

L. Camarinha-matos, R. Fornasiero, and H. Afsarmanesh, Collaborative Networks as a Core Enabler of Industry 4.0, IFIP Advances in Information and, vol.506, pp.3-17, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01674850

B. Ervural and B. , Overview of Cyber Security in the Industry 4.0 Era, pp.267-284, 2018.

M. Centenaro, L. Vangelista, A. Zanella, and M. Zorzi, Long-Range Communications in Unlicensed Bands: the Rising Stars in the IoT and Smart City Scenarios, IEEE Wireless Communications, vol.23, 2016.

U. Raza, P. Kulkarni, and M. Sooriyabandara, Low power wide area networks: An overview, IEEE Communications Surveys Tutorials, pp.1-1, 2017.

A. , A. A. Boulogeorgos, P. D. Diamantoulakis, and G. K. ,

. Karagiannidis, Low Power Wide Area Networks (LPWANs) for Internet of Things (IoT) Applications: Research Challenges and Future Trends, CoRR, 2016.

M. Luvisotto, . Tramarin, S. Vangelista, and . Vitturi2, On the Use of LoRaWAN for Indoor Industrial IoT Applications, Wireless Communications and Mobile Computing, p.11, 2018.

P. Pavlou, State of the information privacy literature: where are we now and where should we go?, MIS quarterly, vol.35, issue.4, pp.977-988, 2011.

B. A. Price, B. Adam, and . Nuseibeh, Keeping ubiquitous computing to yourself:a practical model for user control of privacy, International Journal of Human-Computer Studies, vol.63, issue.1, pp.228-253, 2005.

D. E. Kouicem, A. Bouabdallah, and H. Lakhlef, Internet of things security: a top-down survey, Computer Networks 2018, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01780365

E. Aras, G. Ramachandran, P. Lawrence, and D. Hughes, Exploring the security vulnerabilities of lora, 3rd IEEE International Conference on Cybernetics, pp.1-6, 2017.

Y. Chatzigiannakis, V. Liagkou, and P. Spirakis, Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs), 2nd International Symposium on Cyber Security Cryptography and Machine Learning, 2018.

A. Emekcan, R. Gowri, L. Piers, and H. Danny, Exploring the security vulnerabilities of lora, 3rd IEEE International Conference on Cybernetics (CYBCONF), vol.06, pp.1-6, 2017.

J. Michorius, Whats mine is not yours: Lora network and privacy of data on publishing devices, 25th Twente Student Conference on IT, 2016.

S. Naoui, M. E. Elhdhili, and L. A. Saidane, Enhancing the security of the iot lorawan architecture, International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, pp.1-7, 2016.