2. Eurosmart : Internet of trust Security and privacy in the connected world, Nov 2016
  3. C. Brookson et al  , Tackling the challenge of cyber security, ETSI technical report, Dec 2016,
  4. ETSI, oneM2M Use Case collection,  Technical report 118501, V1.0.0 2015-05
  5. Yves Roudier, Muhammad Sabir Idrees, Ludovic Apvrille, Towards the Model-Driven Engineering of Security Requirements for Embedded Systems, Proceedings of the Model-Driven Requirements Engineering Workshop (MoDRE'13), Rio de Janeiro, Brazil, July 2013
  6. Ludovic Apvrille, Yves Roudier, Designing Safe and Secure Embedded and Cyber-Physical Systems with SysML-Sec, Chapter in Model-Driven Engineering and Software Development, p293--308, Springer International Publishing, 2015
  7. Akram Idani, Yves Ledru, Mohamed-Amine Labiadh. B4MSecure : une plateforme IDM pour la modélisation et la validation de politiques de sécurité en Systèmes d'Information (démo) AFADL 2013, Apr 2013, Nancy, France. pp.85-89, 2013.
  8. Veritas, Cyber security of connected vehicles , BV CAR CYBER sec -001/20161003
  9. Pôle SCS Livre blanc marché e-santé
  10. A. Ray, R. Cleaveland, Security Assurance Cases for Medical Cyber–Physical Systems, IEEE Design and Test 32(5):56-65· October 2015
  11. A. Sangiovanni-Vincentelli, M. Grant. Platform-based design and software design  methodology for embedded systems. IEEE Design & Test of Computers 18.6 (2001): 23-33.
  12. Jean-François Le Tallec, Julien Deantoni, Robert De Simone, Benoît Ferrero, Frédéric Mallet, et al..  Combining SystemC,    IP-XACT and UML/MARTE in model-based SoC design.  Workshop on Model Based Engineering for Embedded Systems Design (M-BED 2011), Mar 2011, Grenoble, France.  2011
  13. H. Affes, M. Auguin, F. Verdier, A. Pégatoquet, Methodology for inserting Clock-Management strategies in Transaction-Level Models of System[11]-on-Chips, FDL’2015, Forum on specification & Design Languages, Sept. 14-16, Barcelona, Spain, 2015
  14. F. Mallet. MARTE/CCSL for Modeling Cyber-Physical Systems. Formal Modeling and Verification of Cyber-Physical Systems, pp. 26-49, Springer, Sep. 2015F.
  15. F. Mallet, M-A Peraldi-Frati, J. Deantoni, R. DeSimone. UML MARTE Time Model and its Clock Constraint Specification Language. In book: Handbook of Research on Embedded Systems Design, Chapter: 2 pp.29-51, June 2014, IGI Publisher, Advances in Engineering Science Reference, DOI: 10.4018/978-1-4666-6194-3.ch002.
  16. J. Deantoni, F. Mallet, F. Thomas, G. Reydet, J.-P. Babau, et al.. RT-simex: retro-analysis of execution traces. Gruia-Catalin Roman, Kevin J. Sullivan. 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering SIGSOFT FSE, Nov 2010, Santa Fe, United States.
  17. M.-A. Peraldi-Frati, J. DeAntoni. Scheduling Multi Clock Real Time Systems: From Requirements to Implementation.  In Int. Symp. on Object/Component/Service-oriented Real-time Distributed Computing", Newport Beach, United States, IEEE computer society, March 2011, pp 50--57.
  18. Carlos Gomez, Julien Deantoni, Frédéric Mallet. Power consumption analysis using multi-view modeling. PATMOS - 23th Int. Work. on Power and Timing Modeling, Optimization and Simulation, Sep 2013, Karlsruhe, Germany. pp.235-238
  19. Mallet and R. de Simone. Correctness Issues in MARTE/CCSL. Sci. Comput. Program., 106:78-92, August 2015, Elsevier.
  1. Dehui Du, Ping Huang, F. Mallet, Mingrui Yang and Kaiqiang Jiang. MARTE/pCCSL: Modeling and Refining Stochastic Behaviors of CPSs with Probabilistic Logical Clocks. Formal Aspects of Component Software (FACS'16), Springer, Oct. 2016.
  2. C. Glitia, J. DeAntoni, F. Mallet, J.-V. Millo, P. Boulet and A. Gamatié. Progressive and explicit refinement of scheduling for multidimensional data-flow applications using UML MARTEDesign Automation of Embedded Systems, 19(1-2):1-33, 2015.
  3. J. Deantoni, C. Brun, B. Caillaud, R. France, Gabor Karsai, et al.. Domain Globalization: Using Languages to Support Technical and Social Coordination  Globalizing Domain-Specific Languages, 9400, Springer International Publishing, pp.70-87, 2015, Lecture Notes in Computer Science, 978-3-319-26171-3.,
  4.  J. Deantoni, P. I. Diallo, C. Teodorov, J. Champeau, B. Combemale. Towards a Meta-Language for the Concurrency Concern in DSLs. IEEE proceedings of Design, Automation and Test in Europe Conference and Exhibition (DATE), 2015
  5. S. Lavirotte, J.-Y. Tigli, G. Rocher, L. El Beze, and A.Palma. « UbiUnity: a Dynamic Visual Simulation Framework for Web of Things ». In: 5th International Conference on Internet of Things (IoT 2015). Séoul, South Korea, Oct. 2015
  6. Projet Hope , Hierarchically Organized Power/Energy Management. Projet ANR 2012 INSE 0003.
  7. C. Barnes, F. Verdier, A. Pegatoquet, D. Gaffé and J. M. Cottin, Wireless sensor network protocol property validation through the system's simulation in a dedicated framework, 2016 10th International Conference on Signal Processing and Communication Systems (ICSPCS), Surfers Paradise, Gold Coast, Australia, 2016, pp. 1-9
  8. L. Rodriguez, B. Miramond, and B. Granado. Toward a sparse self-organizing map for neuromorphic architectures. ACM Journal on Emerging Technologies in Computing Systems (JETC) 11.4 (2015): 33.
  9. Yves Ledru, Akram Idani, Jérémy Milhau, Muhammad Nafees Qamar, Régine Laleau, Jean-Luc Richier, Mohamed-Amine Labiadh. Validation of IS Security Policies featuring Authorisation Constraints. Labiadh International Journal of Information System Modeling and Design, IGI Global, 2015, 6 (1), pp.24-46
  10. Yves Ledru, Akram Idani, Jean-Luc Richier. Validation of a security policy by the test of its formal B specification - a case study, Third FME Work.on Formal Methods in Software Engineering (Formalise’15), 2015, Firenze, Italy, pp.6-12
  11. Matthias Büchler, Karim Hossen, Petru Florin Mihancea, Marius Minea, Roland Groz, Catherine Oriat. Model Inference and Security Testing in the SPaCIoS Project IEEE Working Conference on Reverse Engineering, CSMR-WCRE 2014, 2014, Antwerp, Belgium. pp.411-414, 2014
  12. Fabien Duchene, Sanjay Rawat, Jean-Luc Richier, Roland Groz.  KameleonFuzz: Evolutionary Fuzzing for Black-Box XSS Detection, Fourth ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014, Unknown, ACM, pp.37-48, 2014
  13. Akram Idani, Yves Ledru, Mohamed-Amine Labiadh. B4MSecure : une plateforme IDM pour la modélisation et la validation de politiques de sécurité en Systèmes d'Information (démo) AFADL 2013, Apr 2013, Nancy, France. pp.85-89, 2013.
  14. Pascal Cotret, Guy Gogniat, Martha Johanna Sepúlveda Flórez, Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls. Microprocessors and Microsystems - Embedded Hardware Design 42: 127-141 (2016)
  15. Martha Johanna Sepúlveda, Jean-Philippe Diguet, Marius Strum, Guy Gogniat, NoC-Based Protection for SoC Time-Driven Attacks. Embedded Systems Letters 7(1): 7-10 (2015)
  16. Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat, Architectures of flexible symmetric key crypto engines - a survey: From hardware coprocessor to multi-crypto-processor system on chip. ACM Comput. Surv. 45(4): 41:1-41:32 (2013)
  17. Jérémie Crenne, Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Russell Tessier, Deepak Unnikrishnan, Configurable memory security in embedded systems. ACM Trans. Embedded Comput. Syst. 12(3): 71:1-71:23 (2013)
  18. Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-Philippe Diguet, Lilian Bossuet, Romain Vaslin, Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective. IEEE Trans. VLSI Syst. 16(2): 144-155 (2008)