How the 'Internet of Things' will impact consumers, businesses, and governments in 2016 and beyond. Business Insider, pp.6-12 ,
Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. National Institute of Standards and Technology, 2016. ,
Abusing the Internet of Things, Blackouts, Freakouts , and Stakeouts. Edition O'Reilly, 2015. ,
Mirai source code. [Consulté : 10-12-2016]. [Online] https://github.com/jgamblin/Mirai-Source-Code ,
Security Evaluation of the Z- Wave Wireless Protocol, 2013. ,
Security Flaws in Universal Plug and Play: Unplug, Don't Play, p.29, 2013. ,
Search Engine for Internet-connected devices, pp.15-26 ,
Ardu- Worm: A Functional Malware Targeting Arduino Devices, 2016. ,
Stack Smashing as of Today. Black Hat Europe. 17 Av, 2009. ,
Bluetooth: With Low Energy Comes Low Security ,
IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT, Computing Research Repository, 2016. ,
DOI : 10.1109/icdcs.2017.283
Dowse, the Privacy Hub for the Internet of Things, pp.24-35 ,
SVELTE: Real-time intrusion detection in the Internet of Things, Ad Hoc Networks, 2013. ,
DOI : 10.1016/j.adhoc.2013.04.014