T. Tanzi and J. Isnard, Wireless Public Safety Networks 1. Overview and Challenges, chap. Public Safety Network: an Overview, pp.1-20, 2015.

T. Tanzi, L. Apvrille, J. Dugelay, and Y. Roudier, UAVs for humanitarian missions: Autonomy and reliability, IEEE Global Humanitarian Technology Conference (GHTC 2014)
DOI : 10.1109/GHTC.2014.6970292

B. Ranft, J. Dugelay, and L. Apvrille, 3d perception for autonomous navigation of a low-cost mav using minimal landmarks. International Micro Air Vehicle Conference and Flight Competition, 2013.

Y. Roudier, M. Idrees, and L. Apvrille, Towards the model-driven engineering of security requirements for embedded systems. Model-Driven Requirements Engineering Workshop (MoDRE), 2013.

K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno et al., Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010.
DOI : 10.1109/SP.2010.34

C. Miller and C. Valasek, Remote exploitation of an unaltered passenger vehicle, Black Hat USA, 2015.

L. Apvrille and Y. Roudier, SysML-Sec Attack Graphs: Compact Representations for Complex Attacks. The Second International Workshop on Graphical Models for Security, LNCS, vol.9390, pp.35-49, 2015.
DOI : 10.1007/978-3-319-29968-6_3

B. Kienhuis, E. Deprettere, P. Van-der-wolf, and K. Vissers, A Methodology to Design Programmable Embedded Systems, pp.18-37, 2002.
DOI : 10.1007/3-540-45874-3_2

A. Enrici, L. Apvrille, and R. Pacalet, Model-Driven Engineering Languages and Systems, 17th International Conference Proceedings, chap. A UML Model-Driven Approach to Efficiently Allocate Complex Communication Schemes, pp.370-385, 2014.

D. Saqui-sannes, P. Apvrille, and L. , Making Modeling Assumptions an Explicit Part of Real-Time Systems Models, 8th European Congress on Embedded Real Time Software and Systems (ERTS2'2016), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01291947

J. Bengtsson and Y. W. , Timed automata: Semantics, algorithms and tools. Lecture Notes on Concurrency and Petri Nets, LNCS, vol.3098124, issue.87, 2004.
DOI : 10.1007/978-3-540-27755-2_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.332.8701

B. Blanchet, Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-43410, 2009.
DOI : 10.3233/JCS-2009-0339

A. Kerns, D. Shepard, J. Bhatti, and T. Humphreys, Unmanned Aircraft Capture and Control Via GPS Spoofing, Journal of Field Robotics, vol.32, issue.2, pp.617-636, 2014.
DOI : 10.1109/7.489518

T. Tanzi, O. Sebastien, and C. Rizza, Designing Autonomous Crawling Equipment to Detect Personal Connected Devices and Support Rescue Operations: Technical and Societal Concerns, The Radio Science Bulletin, vol.355, issue.355, pp.35-44, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01516668

W. Muhammad, Abstract application modeling for system design space exploration, Euromicro Conference on Digital System Design (DSD'06), 2006.
URL : https://hal.archives-ouvertes.fr/hal-00525081

F. Balarin, Hardware-Software Co-Design of Embedded Systems, The POLIS Approach, 2003.

P. Wolf, A methodology for architecture exploration of heterogeneous signal processing systems, IEEE Workshop on Signal Processing Systems (SiPS99), 1999.

A. Chatelain, High-level architectural co-simulation using Esterel and C, Proceedings of the ninth international symposium on Hardware/software codesign , CODES '01, 2001.
DOI : 10.1145/371636.371719

I. Assayad and S. Yovine, A framework for modelling and performance analysis of multiprocessor embedded systems: Models and benefits, Proceedings of the 8th conference on Nouvelles Technologies de la Distribution (NOTERE'2007), 2007.

T. Schattkowsky, A model-based approach for executable specifications on recon figurable hardware, Europe Conference and Exhibition, 2005. DATE'05, pp.692-697, 2005.

P. Kukkala, Performance Modeling and Reporting for the UML 2.0 Design of Embedded Systems, 2005 International Symposium on System-on-Chip, pp.50-53, 2005.
DOI : 10.1109/ISSOC.2005.1595642

J. Vidal, F. De-lamotte, G. Gogniat, P. Soulard, and J. Diguet, A co-design approach for embedded system modeling and code generation with UML and MARTE, 2009 Design, Automation & Test in Europe Conference & Exhibition, pp.1-7, 2000.
DOI : 10.1109/DATE.2009.5090662

URL : https://hal.archives-ouvertes.fr/hal-00369036

P. Feiler, B. Lewis, S. Vestal, and E. Colbert, An Overview of the SAE Architecture Analysis & Design Language (AADL) Standard: A Basis for Model-Based Architecture-Driven Embedded Systems Engineering, IFIP- WADL, IFIP, pp.3-15, 2004.
DOI : 10.1007/0-387-24590-1_1

J. Kvarnstrm and P. Doherty, Automated planning for collaborative UAV systems, 2010 11th International Conference on Control Automation Robotics & Vision, pp.1078-1085, 2010.
DOI : 10.1109/ICARCV.2010.5707969

E. Gjondrekaj, M. Loreti, R. Pugliese, F. Tiezzi, C. Pinciroli et al., Towards a Formal Verification Methodology for Collective Robotic Systems, pp.54-70, 2012.
DOI : 10.1007/978-3-642-34281-3_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.474.4660

M. Webster, M. Fisher, N. Cameron, and M. Jump, Formal Methods for the Certification of Autonomous Unmanned Aircraft Systems, pp.228-242, 2011.
DOI : 10.1023/A:1022920129859

J. Chaudemar, E. Bensana, and C. Seguin, Model based safety analysis for an unmanned aerial system. DRHE 2010 -Dependable Robots in Human Environments

A. Fehnker, R. Van-glabbeek, P. Höfner, A. Mciver, M. Portmann et al., Automated Analysis of AODV Using UPPAAL, pp.173-187, 2012.
DOI : 10.1007/978-3-642-28756-5_13

URL : http://arxiv.org/abs/1512.07352

M. Hendriks and M. Verhoef, Timed automata based analysis of embedded system architectures, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, pp.10-1109, 2006.
DOI : 10.1109/IPDPS.2006.1639422

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.507.4616

A. Javaid, W. Sun, V. Devabhaktuni, and M. Alam, Cyber security threat analysis and modeling of an unmanned aerial vehicle system Homeland Security (HST), 2012 IEEE Conference on Technologies for, pp.585-590, 2012.

A. Van-lamsweerde, Elaborating security requirements by construction of intentional anti-models, Proceedings. 26th International Conference on Software Engineering, pp.148-157, 2004.
DOI : 10.1109/ICSE.2004.1317437

C. Raspotnig, V. Katta, P. Karpati, and A. Opdahl, Enhancing CHASSIS: A Method for Combining Safety and Security. Availability, Reliability and Security (ARES), Eighth International Conference on, pp.766-773, 2013.
DOI : 10.1109/ares.2013.102

J. Jürjens and . Umlsec, UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference on The Unified Modeling Language, pp.412-425, 2002.
DOI : 10.1007/3-540-45800-X_32

T. Lodderstedt, D. Basin, and J. Doser, SecureUML: A UML-Based Modeling Language for Model-Driven Security, 5th International Conference on the Unified Modeling Language, pp.426-441, 2002.
DOI : 10.1007/3-540-45800-X_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.6554