K. Delaney and E. Levy, Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and Best Practices, Cisco System Report, 2017.

M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein et al., Understanding the Mirai Botnet, Proceedings of the USENIX Security Symposium, pp.1092-1110, 2017.

E. Bertino and N. Islam, Botnets and Internet of Things Security, Computer, vol.50, issue.02, pp.76-79, 2017.

C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, DDoS in the IoT: Mirai and Other Botnets, vol.50, pp.80-84, 2017.

M. Pahl and L. Donini, Securing IoT Microservices with Certificates, Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2018), pp.1-5, 2018.

F. Bezerra, J. Wainer, and W. M. Aalst, Anomaly Detection Using Process Mining, vol.29, pp.149-161, 2009.

A. Hemmer, R. Badonnel, and I. Chrisment, A Process Mining Approach for Supporting IoT Predictive Security, Proceedings of the Network Operations and Management Symposium (NOMS 2020), 2020.
URL : https://hal.archives-ouvertes.fr/hal-02402986

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine Learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

B. Dongen, A. Medeiros, H. Verbeek, A. Weijters, and W. Aalst, The ProM Framework: A New Era in Process Mining Tool Support, vol.3536, pp.444-454, 2005.