T. Tanzi and J. Isnard, Wireless Public Safety Networks 1. Overview and Challenges, chap. Public Safety Network: an Overview, pp.1-20, 2015.

T. Tanzi, L. Apvrille, J. Dugelay, and Y. Roudier, UAVs for humanitarian missions: Autonomy and reliability, IEEE Global Humanitarian Technology Conference (GHTC 2014)
DOI : 10.1109/GHTC.2014.6970292

B. Ranft, J. Dugelay, and L. Apvrille, 3d perception for autonomous navigation of a low-cost mav using minimal landmarks. International Micro Air Vehicle Conference and Flight Competition, 2013.

Y. Roudier, M. Idrees, and L. Apvrille, Towards the model-driven engineering of security requirements for embedded systems. Model-Driven Requirements Engineering Workshop (MoDRE), 2013.

K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno et al., Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010.
DOI : 10.1109/SP.2010.34

C. Miller and C. Valasek, Remote exploitation of an unaltered passenger vehicle, Black Hat USA, 2015.

L. Apvrille and Y. Roudier, SysML-Sec Attack Graphs: Compact Representations for Complex Attacks. The Second International Workshop on Graphical Models for Security, LNCS, vol.9390, pp.35-49, 2015.
DOI : 10.1007/978-3-319-29968-6_3

B. Kienhuis, E. Deprettere, P. Van-der-wolf, and K. Vissers, A Methodology to Design Programmable Embedded Systems, pp.18-37, 2002.
DOI : 10.1007/3-540-45874-3_2

A. Enrici, L. Apvrille, and R. Pacalet, Model-Driven Engineering Languages and Systems, 17th International Conference Proceedings, chap. A UML Model-Driven Approach to Efficiently Allocate Complex Communication Schemes, pp.370-385, 2014.

D. Saqui-sannes, P. Apvrille, and L. , Making Modeling Assumptions an Explicit Part of Real-Time Systems Models, 8th European Congress on Embedded Real Time Software and Systems (ERTS2'2016), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01291947

J. Bengtsson and Y. W. , Timed automata: Semantics, algorithms and tools. Lecture Notes on Concurrency and Petri Nets, LNCS, vol.3098124, issue.87, 2004.
DOI : 10.1007/978-3-540-27755-2_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Blanchet, Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-43410, 2009.
DOI : 10.3233/JCS-2009-0339

A. Kerns, D. Shepard, J. Bhatti, and T. Humphreys, Unmanned Aircraft Capture and Control Via GPS Spoofing, Journal of Field Robotics, vol.32, issue.2, pp.617-636, 2014.
DOI : 10.1109/7.489518

T. Tanzi, O. Sebastien, and C. Rizza, Designing Autonomous Crawling Equipment to Detect Personal Connected Devices and Support Rescue Operations: Technical and Societal Concerns, The Radio Science Bulletin, vol.355, issue.355, pp.35-44, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01516668

W. Muhammad, Abstract application modeling for system design space exploration, Euromicro Conference on Digital System Design (DSD'06), 2006.
URL : https://hal.archives-ouvertes.fr/hal-00525081

F. Balarin, Hardware-Software Co-Design of Embedded Systems, The POLIS Approach, 2003.

P. Wolf, A methodology for architecture exploration of heterogeneous signal processing systems, IEEE Workshop on Signal Processing Systems (SiPS99), 1999.

A. Chatelain, High-level architectural co-simulation using Esterel and C, Proceedings of the ninth international symposium on Hardware/software codesign , CODES '01, 2001.
DOI : 10.1145/371636.371719

I. Assayad and S. Yovine, A framework for modelling and performance analysis of multiprocessor embedded systems: Models and benefits, Proceedings of the 8th conference on Nouvelles Technologies de la Distribution (NOTERE'2007), 2007.

T. Schattkowsky, A model-based approach for executable specifications on recon figurable hardware, Europe Conference and Exhibition, 2005. DATE'05, pp.692-697, 2005.

P. Kukkala, Performance Modeling and Reporting for the UML 2.0 Design of Embedded Systems, 2005 International Symposium on System-on-Chip, pp.50-53, 2005.
DOI : 10.1109/ISSOC.2005.1595642

J. Vidal, F. De-lamotte, G. Gogniat, P. Soulard, and J. Diguet, A co-design approach for embedded system modeling and code generation with UML and MARTE, 2009 Design, Automation & Test in Europe Conference & Exhibition, pp.1-7, 2000.
DOI : 10.1109/DATE.2009.5090662

URL : https://hal.archives-ouvertes.fr/hal-00369036

P. Feiler, B. Lewis, S. Vestal, and E. Colbert, An Overview of the SAE Architecture Analysis & Design Language (AADL) Standard: A Basis for Model-Based Architecture-Driven Embedded Systems Engineering, IFIP- WADL, IFIP, pp.3-15, 2004.
DOI : 10.1007/0-387-24590-1_1

J. Kvarnstrm and P. Doherty, Automated planning for collaborative UAV systems, 2010 11th International Conference on Control Automation Robotics & Vision, pp.1078-1085, 2010.
DOI : 10.1109/ICARCV.2010.5707969

E. Gjondrekaj, M. Loreti, R. Pugliese, F. Tiezzi, C. Pinciroli et al., Towards a Formal Verification Methodology for Collective Robotic Systems, pp.54-70, 2012.
DOI : 10.1007/978-3-642-34281-3_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Webster, M. Fisher, N. Cameron, and M. Jump, Formal Methods for the Certification of Autonomous Unmanned Aircraft Systems, pp.228-242, 2011.
DOI : 10.1023/A:1022920129859

J. Chaudemar, E. Bensana, and C. Seguin, Model based safety analysis for an unmanned aerial system. DRHE 2010 -Dependable Robots in Human Environments

A. Fehnker, R. Van-glabbeek, P. Höfner, A. Mciver, M. Portmann et al., Automated Analysis of AODV Using UPPAAL, pp.173-187, 2012.
DOI : 10.1007/978-3-642-28756-5_13

URL : http://arxiv.org/abs/1512.07352

M. Hendriks and M. Verhoef, Timed automata based analysis of embedded system architectures, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, pp.10-1109, 2006.
DOI : 10.1109/IPDPS.2006.1639422

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Javaid, W. Sun, V. Devabhaktuni, and M. Alam, Cyber security threat analysis and modeling of an unmanned aerial vehicle system Homeland Security (HST), 2012 IEEE Conference on Technologies for, pp.585-590, 2012.

A. Van-lamsweerde, Elaborating security requirements by construction of intentional anti-models, Proceedings. 26th International Conference on Software Engineering, pp.148-157, 2004.
DOI : 10.1109/ICSE.2004.1317437

C. Raspotnig, V. Katta, P. Karpati, and A. Opdahl, Enhancing CHASSIS: A Method for Combining Safety and Security. Availability, Reliability and Security (ARES), Eighth International Conference on, pp.766-773, 2013.
DOI : 10.1109/ares.2013.102

J. Jürjens and . Umlsec, UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference on The Unified Modeling Language, pp.412-425, 2002.
DOI : 10.1007/3-540-45800-X_32

T. Lodderstedt, D. Basin, and J. Doser, SecureUML: A UML-Based Modeling Language for Model-Driven Security, 5th International Conference on the Unified Modeling Language, pp.426-441, 2002.
DOI : 10.1007/3-540-45800-X_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=