J. Greenough, How the 'Internet of Things' will impact consumers, businesses, and governments in 2016 and beyond. Business Insider, pp.6-12

R. Ross, M. Mcevilley, and J. C. Oren, Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. National Institute of Standards and Technology, 2016.

N. Dhanjani, Abusing the Internet of Things, Blackouts, Freakouts , and Stakeouts. Edition O'Reilly, 2015.

J. Gamblin, Mirai source code. [Consulté : 10-12-2016]. [Online] https://github.com/jgamblin/Mirai-Source-Code

B. Fouladi and S. Ghanoun, Security Evaluation of the Z- Wave Wireless Protocol, 2013.

H. Moore, Security Flaws in Universal Plug and Play: Unplug, Don't Play, p.29, 2013.

. Shodan and . Io, Search Engine for Internet-connected devices, pp.15-26

S. Pastrana, J. Rodriguez-canseco, and A. Calleja, Ardu- Worm: A Functional Malware Targeting Arduino Devices, 2016.

H. Fritsch, Stack Smashing as of Today. Black Hat Europe. 17 Av, 2009.

M. Ryan, Bluetooth: With Low Energy Comes Low Security

M. Miettinen, A. Sadeghi, S. Marchal, N. Asokan, I. Hafeez et al., IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT, Computing Research Repository, 2016.
DOI : 10.1109/icdcs.2017.283

. Dyne and . Org, Dowse, the Privacy Hub for the Internet of Things, pp.24-35

S. Raza, L. Wallgren, and T. Voigt, SVELTE: Real-time intrusion detection in the Internet of Things, Ad Hoc Networks, 2013.
DOI : 10.1016/j.adhoc.2013.04.014