A decade of model-driven security, Proceedings of the 16th ACM symposium on Access control models and technologies, pp.1-10, 2011. ,
, Models@ run. time. Computer, vol.42, issue.10, 2009.
Opengis sensor model language (sensorml) implementation specification. OpenGIS Implementation Specification OGC, 2007. ,
Applying a modelbased approach for embedded system development, Software Engineering and Advanced Applications, 2007. ,
Wireless heart rate monitoring system using mqtt, Procedia Computer Science, vol.86, pp.160-163, 2016. ,
, OASIS XACML Technical Committee et al. extensible access control markup language (xacml) version 3.0. Oasis standard, OASIS, 2013.
Role-based access control: Features and motivations, Proceedings of the Annual Computer Security Applications Conference, 1995. ,
Processes for producing secure software, IEEE Security & Privacy, vol.2, issue.3, pp.18-25, 2004. ,
Mapping of high-level sdl models to efficient implementations for tinyos, Digital System Design, pp.402-406, 2004. ,
Eclipse Vorto-IoT Toolset for standardized device descriptions ,
Gartner says 8.4 billion connected" things" will be in use in 2017, 2016. ,
Xtext: Implement your language faster than the quick and dirty way, Proceedings of the ACM International Conference Companion on Object Oriented Programming Systems Languages and Applications Companion, OOPSLA '10, pp.307-309, 2010. ,
Thingml: a language and code generation framework for heterogeneous targets, Proceedings I. Berrouyne ,
, of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp.125-135, 2016.
Smart nest thermostat: A smart spy in your home, 2014. ,
Guide to attribute based access control (abac) definition and considerations (draft). NIST special publication, vol.800, 2013. ,
Ddos in the iot: Mirai and other botnets, Computer, vol.50, issue.7, pp.80-84, 2017. ,
Mosquitto: server and client implementation of the mqtt protocol, Journal of Open Source Software, vol.2, issue.13, 2017. ,
Handling mobility in iot applications using the mqtt protocol, Internet Technologies and Applications (ITA), 2015. ,
Internet of things (iot) security: Current status, challenges and prospective measures, Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for, pp.336-341, 2015. ,
Model-Driven Extraction and Analysis of Network Security Policies, Model-Driven Engineering Languages and Systems, pp.52-68, 2013. ,
Asto: A tool for security analysis of iot systems, Software Engineering Research, Management and Applications, pp.395-400, 2017. ,
Model-based software engineering to tame the iot jungle, IEEE Software, vol.34, issue.1, pp.30-36, 2017. ,
Mda guide version 1.0. 1. Object Management Group, 2003. ,
Securing the internet of things survey, SANS Institute, pp.1-22, 2014. ,
Access control in decentralised publish/subscribe systems, JNW, vol.2, issue.2, pp.57-67, 2007. ,
SensIDL: Towards a generic framework for implementing sensor communication interfaces, 2015. ,
Iot security vulnerability: A case study of a web camera, Advanced Communication Technology (ICACT), pp.172-177, 2018. ,
Content-based publish/subscribe systems. In Handbook of Peer-toPeer Networking, pp.1333-1366, 2010. ,
, TrendLabs Security Intelligence BlogPersirai: New Internet of Things (IoT) Botnet Targets IP Cameras-TrendLabs Security Intelligence Blog, 2017.
Agile development of home automation system with thingml, IEEE 14th International Conference on, 2016. ,
Ddos attack that disrupted internet was largest of its kind in history, experts say. The Guardian, vol.26, 2016. ,