A. Pétrissans, S. Krawczyk, G. Cattaneo, N. Feeney, L. Veronesi et al., Towards SoS trends and challenges, IDC, Tech. Rep, 2012.

R. Jaradat and C. Keating, A histogram analysis for SoS, Inderscience, 2014.

M. Jamshidi, SoS innovations for 21st century, ICIIS, IEEE international Conference on Industrial and Information Systems, 2008.

M. Maier, Architecting principles for SoS, Systems Engineering, 1998.
DOI : 10.1002/j.2334-5837.1996.tb02054.x

M. Gonçalves, E. Cavalcante, T. Batista, F. Oquendo, and E. Nakagawa, Towards a conceptual model for software-intensive SoS, IEEE International Conference on Systems, 2014.

H. Dogan, C. Ncube, S. Lim, M. Henshaw, C. Siemieniuch et al., Economic and societal significance of the sos research agenda, IEEE International Conference on Systems, 2013.

J. E. Hachem, Towards Model Driven Architecture and analysis of SoS access control, International conference on software Engineering Doctoral Symposium, 2015.

V. Chiprianov, L. Gallon, M. Munier, P. Aniorte, and V. Lalanne, Challenges in security engineering of SoS, Conférence de l'Ingénierie Logiciel, 2014.

, Information technology -Security techniques -Information security management systems -Overview and vocabulary, ISO IEC 27000, section 2, Terms and definition, 2014.

L. Gallon and J. Bascou, Cvss attack graphs, 7th International Conference on Signal-Image Technology and Internet-Based Systems (SITIS), 2011.
DOI : 10.1109/sitis.2011.24

URL : https://hal.archives-ouvertes.fr/hal-00633615

C. Guariniello and D. Delaurentis, Communications, information, and cyber security in SoS: Assessing the impact of attacks through interdependency analysis, 2014.

, Sql slammer worm lessons learned for consideration by the electricity sector, North American Electric Reliability Council, 2003.

A. Austin, C. Holmgreen, and L. Williams, A comparison of the efficiency and effectiveness of vulnerability discovery techniques, Information and Software Technology, vol.55, pp.1279-1288, 2013.

E. Nakagawa and O. Oquendo, The state of the art and future perspectives in SoS software architecture, Proceedings of the International Workshop on Software Engineering for SoS, 2013.

P. Baker, S. Loh, and F. Weil, Model-Driven Engineering in a large industrial context -motorola case study, MDE Languages and Systems, vol.3713, pp.476-491, 2005.

I. Kurtev, J. Bézivin, F. Jouault, and P. Valduriez, Model-based DSL frameworks, Companion to the ACM symposium on Object-oriented programming systems, languages, and applications, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00483594

L. Zhang, Applying system of systems engineering approach to build complex cyber physical systems, Advances in Intelligent Systems and Computing, 2015.

E. Cavalcante, A. Medeiros, and T. Batista, Describing cloud applications architectures, Proceedings of the 7th European conference on Software Architecture, 2013.

J. Bryans, J. Fitzgerald, R. Payne, A. Myazawa, and K. Kristensen, SysML contracts for SoS, International SoS Engineering Conference, 2014.

M. Guessi, E. Cavalcante, and L. Oliveira, Characterizing architecture description languages for Software-Intensive SoS, International Workshop on Software Engineering for Systems-of-Systems Conference, 2015.

E. Silva, E. Cavalcante, T. Batista, F. Oquendo, F. Delicato et al., On the characterization of missions of SoS, European Conference on Software Architecture Workshops, 2014.

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.

M. Duren, H. Aldridge, R. Abercrombie, T. Sheldon, and . Frederick, Designing and operating through compromise: Architectural analysis of CKMS for the advanced metering infrastructure, 8th Cyber Security and Information Intelligence Research Workshop, 2013.

M. Merabti, M. Kennedy, and W. Hurst, Critical infrastructure protection: A 21st century challenge, International Conference on Communications and Information Technology, 2011.

J. Jurjens, UMLsec : extending UML for secure systems development, Fifth International Conference on The Unified Modeling Language, Model Engineering, Languages Concepts and Tools, 2002.

T. Lodderstedt, D. Basin, and J. Doser, SecureUML : A UMLBased Modeling Language for Model-Driven Security, International Conference Unified Modeling Language, Model Engineering, Languages Concepts and Tools, 2002.

G. Elahi and E. Yu, A goal oriented approach for modeling and analyzing security trade-offs, International Conference on Conceptual Modeling, 2007.

D. Arzapalo, L. Gallon, and P. Aniorte, MoDELO: a MOdel-Driven sEcurity poLicy approach based on Orbac, 8ème conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01092971

L. Apvrille and Y. Roudier, Towards the model-driven engineering of secure yet safe embedded systems, 1st International Workshop on Graphical Models for Security, 2014.

A. Vallecillo, On the Combination of Domain Specific Modeling Languages, pp.305-320, 2010.

D. Rumsfeld, Known and Unknown: a memoir. Penguin group, 2011.

A. Rashid, S. Nakvi, R. Ramdhany, M. Edwards, R. Chitchyan et al., Discovering unknown known security requirements, the 38th International Conference on Software Engineering, 2016.

R. Anderson, Security engineering: a guide to building dependable distributed systems, 2001.

A. Babar, Smart cities: Socio-technical innovation for empowering citizens, Australian Quarterly, 2016.

G. S. Association, Smart cities, developing collaborative mobilebased city solutions for smart cities, Shanghai, Tech. Rep, 2013.