1. K. L. Lueth , State of the IoT 2020: 12 billion IoT connections, surpassing non-IoT for the first time," IoT Analytics , Nov 2021 . K. L. Lueth, State of the IoT 2020: 12 billion IoT connections, surpassing non-IoT for the first time," IoT Analytics, Nov 2021.
2. K. Keerthi , I. Roy , A. Hazra , and C. Rebeiro , Formal verification for security in IoT devices," Security and Fault Tolerance in Internet of Things , pp. 179 -- 200 , 2019 . K. Keerthi, I. Roy, A. Hazra, and C. Rebeiro, Formal verification for security in IoT devices," Security and Fault Tolerance in Internet of Things, pp. 179--200, 2019.
3. A. Greenberg , Hackers remotely kill a Jeep on the highway-with me in it," Wired , Jul 2015 . A. Greenberg, Hackers remotely kill a Jeep on the highway-with me in it," Wired, Jul 2015.
4. de Saqui-Sannes and J. Hugues, Combining SysML and AADL for the design, validation and implementation of critical systems;P;ERTS2,2012
5. P. H. Feiler , D. P. Gluch , and J. J. Hudak , The architecture analysis & design language (AADL): An introduction," tech. rep ., Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst , 2006 . P. H. Feiler, D. P. Gluch, and J. J. Hudak, The architecture analysis & design language (AADL): An introduction," tech. rep., Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst, 2006.