F. Adaili, O. Mosbahi, M. Khalgui, and S. Bouzefrane, New solutions for useful execution models of communicating adaptive ra2dl, Intelligent Software Methodologies, Tools and Techniques, vol.532, pp.87-101, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02425170

J. Bengtsson, K. Larsen, F. Larsson, P. Pettersson, Y. et al., Uppaal: A tool suite for automatic verification of real-time systems, pp.232-243, 1996.

M. Bielikov, A body-monitoring system with eeg and eog sensors, Journal of ERCIM News, issue.49, 2002.

P. Brereton and D. Budgen, Component-based systems: a classification of issues, Computer, vol.33, issue.11, pp.54-62, 2000.

X. Cai, M. Lyu, K. Wong, and R. Ko, Component-based software engineering: technologies, development frameworks, and quality assurance schemes, Software Engineering Conference, pp.372-379, 2000.

P. C. Clements, A survey of architecture description languages, Proceedings of the 8th International Workshop on Software Specification and Design, IWSSD '96, p.16, 1996.

A. Elena-rugina, K. Kanoun, and M. Kaniche, An architecture-based dependability modeling framework using aadl, 10th IASTED International Conference on Software Engineering and Applications SEA2006, 2006.

F. Adaili, O. Mosbahi, M. Khalgui, and S. Bouzefrane, Ra2dl: New flexible solution for adaptive aadl-based control components, Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems, pp.247-258, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01126501

J. Hansson, P. H. Feiler, and J. Morley, Building secure systems using model-based engineering and architectural models, CrossTalk: The Journal of Defense Software Engineering, vol.21, issue.9, 2008.

D. Husemann, R. Steinbugler, and B. Striemer, Body monitoring using local area wireless interfaces, p.865, 2004.

J. Alves-foss, W. S. Harrison, P. O. Taylor, and C. , The mils architecture for high assurance embedded systems, International Journal of Embedded Systems, 2006.

J. Jürjens, Umlsec: Extending uml for secure systems development, Proceedings of the 5th International Conference on The Unified Modeling Language, UML '02, pp.412-425, 2002.

P. Kocher, R. Lee, G. Mcgraw, and A. Raghunathan, Security as a new dimension in embedded system design, Proceedings of the 41st Annual Design Automation Conference, DAC '04, pp.753-760, 2004.

H. Mouratidis, M. Kolp, S. Faulkner, and P. Giorgini, A secure architectural description language for agent systems, Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, AA-MAS '05, pp.578-585, 2005.

A. Ms, Security needs in embedded systems, Cryptology ePrint Archive, 0198.

A. Ray and R. Cleaveland, A software architectural approach to security by design, 30th Annual International Computer Software and Applications Conference, vol.2, pp.83-86, 2006.

J. Ren and R. Taylor, A secure software architecture description language, Workshop on Software Security Assurance Tools, Techniques, and Metrics, pp.82-89, 2005.

M. O. Salem, O. Mosbahi, M. Khalgui, and G. Frey, Zizo: Modeling, simulation and verification of reconfigurable real-time control tasks sharing adaptive resources -application to the medical project bros, Proceedings of the International Conference on Health Informatics, pp.20-31, 2015.

T. Vergnaud, L. Pautet, and F. Kordon, Using the aadl to describe distributed applications from middleware to software components, Reliable Software Technology -Ada-Europe 2005, 10th Ada-Europe International Conference on Reliable Software Technologies, pp.67-78, 2005.
URL : https://hal.archives-ouvertes.fr/hal-01493416

E. Yoon, W. Lee, and K. Yoo, Secure papbased RADIUS protocol in wireless networks, Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, Third International Conference on Intelligent Computing, pp.689-694, 2007.