F. Adaili, O. Mosbahi, M. Khalgui, and S. Bouzefrane, New solutions for useful execution models of communicating adaptive ra2dl, Intelligent Software Methodologies, Tools and Techniques, vol.532, pp.87-101, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02425170

J. Bengtsson, K. Larsen, F. Larsson, P. Pettersson, and W. Yi, Uppaal: A tool suite for automatic verification of real-time systems, pp.232-243, 1996.

D. Bernstein, Containers and cloud: From lxc to docker to kubernetes, Cloud Computing, IEEE, vol.1, issue.3, pp.81-84, 2014.

M. Bielikov, A body-monitoring system with eeg and eog sensors, Journal of ERCIM News, issue.49, 2002.

P. Brereton and D. Budgen, Component-based systems: a classification of issues, Computer, vol.33, issue.11, pp.54-62, 2000.

X. Cai, M. R. Lyu, K. Wong, and R. Ko, Component-based software engineering: technologies, development frameworks, and quality assurance schemes, Software Engineering Conference, pp.372-379, 2000.

C. Paul and . Clements, A survey of architecture description languages, Proceedings of the 8th International Workshop on Software Specification and Design, IWSSD '96, p.16, 1996.

A. Elena-rugina, K. Kanoun, and M. Kaniche, An architecture-based dependability modeling framework using aadl, 10th IASTED International Conference on Software Engineering and Applications SEA2006, 2006.

F. Adaili, O. Mosbahi, M. Khalgui, and S. Bouzefrane, Ra2dl: New flexible solution for adaptive aadl-based control components, Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems, pp.247-258, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01126501

J. Hansson, H. Peter, J. Feiler, and . Morley, Building secure systems using model-based engineering and architectural models, CrossTalk: The Journal of Defense Software Engineering, vol.21, issue.9, 2008.

D. Husemann, R. Steinbugler, and B. Striemer, Body monitoring using local area wireless interfaces, p.865, 2004.

P. Oman, J. Alves-foss, W. S. Harrison, and C. Taylor, The mils architecture for high assurance embedded systems, International Journal of Embedded Systems, 2006.

J. Jürjens, Umlsec: Extending uml for secure systems development, Proceedings of the 5th International Conference on The Unified Modeling Language, UML '02, pp.412-425, 2002.

P. Kocher, R. Lee, G. Mcgraw, and A. Raghunathan, Security as a new dimension in embedded system design, Proceedings of the 41st Annual Design Automation Conference, DAC '04, pp.753-760, 2004.

H. Mouratidis, M. Kolp, S. Faulkner, and P. Giorgini, A secure architectural description language for agent systems, Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS '05, pp.578-585, 2005.

M. S. Anoop, Security needs in embedded systems, Cryptology ePrint Archive, 2008.

A. Ray and R. Cleaveland, A software architectural approach to security by design, 30th Annual International Computer Software and Applications Conference, COMPSAC, vol.2, pp.83-86, 2006.

J. Ren and R. Taylor, A secure software architecture description language, Workshop on Software Security Assurance Tools, Techniques, and Metrics, pp.82-89, 2005.

M. Salem, O. Mosbahi, M. Khalgui, and G. Frey, Zizo: Modeling, simulation and verification of reconfigurable real-time control tasks sharing adaptive resources -application to the medical project bros, Proceedings of the International Conference on Health Informatics, pp.20-31, 2015.

T. Vergnaud, L. Pautet, and F. Kordon, Using the aadl to describe distributed applications from middleware to software components, Reliable Software Technology -Ada-Europe 2005, 10th Ada-Europe International Conference on Reliable Software Technologies, pp.67-78, 2005.
URL : https://hal.archives-ouvertes.fr/hal-01493416

E. Yoon, W. Lee, and K. Yoo, Secure pap-based RADIUS protocol in wireless networks, Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, Third International Conference on Intelligent Computing, pp.689-694, 2007.