I. Tolerant-routing-in-wsns and .. , 80 6.2.1 INSENS -Intrusion-tolerant routing protocol for wireless SEnsor NetworkS 81 6.2.2 ITSRP -Intrusion Tolerant, Secure Routing Protocol, p.83

V. Hoa, L. , and A. R. Cavalli, Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey, International Journal on AdHoc Networking Systems (IJANS), pp.1-20
DOI : 10.5121/ijans.2014.4201

V. Hoa, L. , and A. R. Cavalli, A study of Intrusion-tolerant routing in Wireless Sensor Networks, Proceedings of the Institute for System Programming of RAS, pp.99-110, 2014.

V. Hoa, L. , and A. R. Cavalli, A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks, 10th International Conference on Broadband and Wireless Computing, Communication and Applications, pp.6-12, 2015.

R. Vinh-hoa-la, A. R. Fuentes, and . Cavalli, Network monitoring using mmt: An application based on the user-agent field in http headers, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp.147-154, 2016.

V. Hoa, L. , and A. R. Cavalli, A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks, Proceedings of 36th IEEE International Conference on Distributed Computing Systems Second IEEE International Workshop on Security Testing and Monitoring, p.2016, 2016.

R. Vinh-hoa-la, A. R. Fuentes, and . Cavalli, A Novel Monitoring Solution for 6LoWPAN-based Wireless Sensor Networks, 2016 IEEE 22nd Asia-Pacific Conference on Communications (APCC), 2016.

V. Hoa, L. , and A. R. Cavalli, Information-Theoretic Approach for Anomaly Detection: A Case Study in RPL-based Internet of Things, In EAI Endorsed Transactions on Security and Safety, p.2016

V. Hoa, L. , and A. R. Cavalli, Novel Learning Techniques for Anomaly Investigation and Detection in Large Scale, In Journal of Computers, p.2016

R. Fuentes, V. H. La, and A. R. Cavalli, Secure M2M Communication Monitoring in 6LoWPAN-based Wireless Sensor Networks, Wireless Networks: the journal of mobile communication, computation and information, p.2016

V. Hoa, L. , and A. R. Cavalli, Intrusion detection and intrusion tolerance for 6LoWPAN-based Wireless Sensor Networks, Intrusion Detection and Prevention for Mobile Ecosystems. CRC Series in Security, Privacy and Trust -Taylor & Francis, p.2016

V. Hoa, L. , and A. R. Cavalli, Intrusion-tolerant Routing in Wireless Sensor Networks, Journée sur la sécurité des SCADA et des infrastructures critiques, 2014.

V. Hoa, L. , and A. R. Cavalli, Intrusion-tolerant Routing in Wireless Sensor Networks, French-Russian seminar on Software Verification, Testing and Quality Estimation, 2014.

V. Hoa, L. , and A. R. Cavalli, Network Security Testing using MMT: A case study in IDOLE project, TAROT Summer School 2015, 2015.

R. Vinh-hoa-la, A. R. Fuentes, and . Cavalli, Network Monitoring using MMT: An application based on the User-Agent field in HTTP headers, Journées non thématiques RESCOM, 2016.

V. Hoa, L. , and A. R. Cavalli, Security Monitoring for Network Protocols and Applications, TAROT Summer School 2016, 2016.

B. Wehbi, E. Montes-de-oca, and M. Bourdelles, Events-Based Security Monitoring Using MMT Tool, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, pp.860-863, 2012.
DOI : 10.1109/ICST.2012.188

J. Deng, R. Han, and S. Mishra, INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications, vol.29, issue.2, pp.216-230, 2006.
DOI : 10.1016/j.comcom.2005.05.018

URL : http://www.cs.colorado.edu/~rhan/INSENS.pdf

S. Vladimir and S. Lorenzo, A survey on online monitoring approaches of computerbased systems, Centre for Software Reliability, 2009.

I. Cisco and . Affiliates, SNORT official homepage

V. Paxson, Bro: a system for detecting network intruders in real-time, Proceedings of the 7th Conference on USENIX Security Symposium -Volume 7, ser. SSYM'98, pp.3-3, 1998.
DOI : 10.1016/S1389-1286(99)00112-7

T. B. Project, Bro official homepage

S. Homepage, Open Source Network-based Intrusion Detection System

E. Albin and N. C. Rowe, A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems, 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp.122-127, 2012.
DOI : 10.1109/WAINA.2012.29

P. Homepage, Open Source Network-based Intrusion Detection System

K. Thongkanchorn, S. Ngamsuriyaroj, and V. Visoottiviseth, Evaluation studies of three intrusion detection systems under various attacks and rule sets, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), pp.6-9, 2013.
DOI : 10.1109/TENCON.2013.6718975

F. Wang, R. Uppalli, and C. Killian, Analysis of techniques for building intrusion tolerant server systems, Military Communications Conference, 2003. MILCOM '03. 2003 IEEE, pp.729-734, 2003.

Q. Nguyen and A. Sood, A Comparison of Intrusion-Tolerant System Architectures, IEEE Security & Privacy Magazine, vol.9, issue.4, pp.24-31, 2011.
DOI : 10.1109/MSP.2010.145

. Montimage, MMT-Security: User Guide. https://github.com/Montimage/MMT Security/blob/master/MMT Security User Guide.pdf, pp.5-09, 2013.

J. Pokhrel, B. Wehbi, A. Morais, A. Cavalli, and E. Allilaire, Estimation of QoE of video traffic using a fuzzy expert system, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp.224-229, 2013.
DOI : 10.1109/CCNC.2013.6488450

URL : https://hal.archives-ouvertes.fr/hal-00816061

. Bricks, Advanced SQL Injection on user agent

D. Manners, The User Agent Field: Analyzing and Detecting the Abnormal or Malicious in your Organization, 2012.

. Mustlive, XSS attacks via user-agent header, pp.5-09, 2011.

O. Foundation, Top 10 web vulnerabilities in 2013, 2013.

J. Nieto, Pytbull-IDS/IPS Testing Framework

Y. Aboukir, SQL Injection through HTTP Headers Application Security, 2012.

V. Labs, Analyzing User-Agent Strings For Use In Real-World Detection Scenarios

. Psychedelix, List of User-Agents (Spiders, Robots, Crawler, Browser)

E. Albin and N. Rowe, A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems, 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp.122-127, 2012.
DOI : 10.1109/WAINA.2012.29

K. Thongkanchorn, S. Ngamsuriyaroj, and V. Visoottiviseth, Evaluation studies of three intrusion detection systems under various attacks and rule sets, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), pp.1-4, 2013.
DOI : 10.1109/TENCON.2013.6718975

T. F. Matthews and J. White, Quantitative Analysis of Intrusion Detection Systems: Snort and SuricataClarkson University, 2011.

J. Macaulay, L. Buckalew, and G. Chung, Internet of Things in Logistics, DHL Trend Research, vol.1, issue.1, pp.1-27, 2015.

O. Hersent, D. Boswarthick, and O. Elloumi, The internet of things : key applications and protocols, 2012.
DOI : 10.1002/9781119958352

M. R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. A. Grieco et al., Standardized Protocol Stack for the Internet of (Important) Things, IEEE Communications Surveys & Tutorials, vol.15, issue.3, pp.1389-1406, 2013.
DOI : 10.1109/SURV.2012.111412.00158

X. Ma and W. Luo, The Analysis of 6LowPAN Technology, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, pp.963-966, 2008.
DOI : 10.1109/PACIIA.2008.72

J. P. Vasseur, N. Agarwal, J. Hui, Z. Shelby, P. Bertrand et al., RPL: The IP routing protocol designed for low power and lossy networks, In Internet Protocol for Smart Objects (IPSO) Alliance, p.20, 2011.

D. Karaman, N. Gozuacik, M. O. Alagoz, H. Ilhan, U. Cagal et al., Managing 6LoWPAN sensors with CoAP on internet, 2015 23nd Signal Processing and Communications Applications Conference (SIU), pp.1389-1392, 2015.
DOI : 10.1109/SIU.2015.7130101

S. Raza, D. Trabalza, and T. Voigt, 6LoWPAN Compressed DTLS for CoAP, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, pp.287-289, 2012.
DOI : 10.1109/DCOSS.2012.55

V. H. La, R. Fuentes, and A. R. Cavalli, Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp.147-154, 2016.
DOI : 10.1109/AINA.2016.41

S. Raza, L. Wallgren, and T. Voigt, SVELTE: Real-time intrusion detection in the Internet of Things, Ad Hoc Networks, pp.2661-2674, 2013.
DOI : 10.1016/j.adhoc.2013.04.014

A. H. Farooqi and F. A. Khan, Intrusion Detection Systems for Wireless Sensor Networks: A Survey, Communications in Computer and Information Science, issue.56, pp.234-241, 2009.

P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits, Denial-of-Service detection in 6LoWPAN based Internet of Things, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.600-607, 2013.
DOI : 10.1109/WiMOB.2013.6673419

P. Kasinathan, G. Costamagna, H. Khaleel, C. Pastrone, and M. A. Spirito, DEMO: An IDS framework for internet of things empowered by 6LoWPAN, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1337-1340, 2013.
DOI : 10.1145/2508859.2512494

C. M. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics), 2006.

C. E. Shannon, A mathematical theory of communication, ACM SIGMOBILE Mobile Computing and Communications Review, vol.5, issue.1, pp.3-55, 2001.
DOI : 10.1145/584091.584093

F. I. Lab, IoT experimentation at a large scale

V. H. La and A. R. Cavalli, A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks, 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), p.2016, 2016.
DOI : 10.1109/ICDCSW.2016.11

D. Curiac, O. Banias, F. Dragan, C. Volosencu, and O. Dranga, Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique, International Conference on Networking and Services (ICNS '07), pp.83-83, 2007.
DOI : 10.1109/ICNS.2007.79

I. M. Atakli, H. Hu, Y. Chen, W. Ku, and Z. Su, Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation, Proceedings of the 2008 Spring simulation multiconference, pp.836-843, 2008.

S. H. Oh, C. O. Hong, and Y. Choi, A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks, pp.84-90, 2012.

I. Grand, E. Nancy, and T. Nancy, A Taxonomy of Attacks in RPL-based Internet of Things, pp.459-473, 2016.

D. P. and Y. Deswarte, Intrusion-tolerance on the Internet (tolerance aux intrusions sur internet), " Presentation at LAAS-CNRS, 2005.

B. B. Madan and K. S. Trivedi, Security Modeling and Quantification of Intrusion Tolerant Systems Using Attack-response Graph, High Speed Networks, pp.297-308, 2004.

F. Wang, R. Uppalli, and C. Killian, Analysis of techniques for building intrusion tolerant server systems, Military Communications Conference, 2003. MILCOM '03. 2003 IEEE, pp.729-734, 2003.

W. Liang-min, J. Ma, C. Wang, and A. Kot, Fault and intrusion tolerance of wireless sensor networks, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, p.7, 2006.
DOI : 10.1109/IPDPS.2006.1639677

R. Ma, L. Xing, and H. E. Michel, Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
DOI : 10.1109/DASC.2006.30

R. H. Deng and S. Mishra, INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications, vol.29, issue.2, 2004.
DOI : 10.1016/j.comcom.2005.05.018

URL : http://www.cs.colorado.edu/~rhan/INSENS.pdf

J. Zhou, C. Li, Q. Cao, and Y. Shen, An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network, Information and Automation ICIA 2008. International Conference on, pp.1547-1552, 2008.

J. Deng, R. Han, and S. Mishra, A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks, pp.349-364, 2003.
DOI : 10.1007/3-540-36978-3_23

A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-5341016598314198, 2002.
DOI : 10.1145/381677.381696

I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: a survey, Computer Networks, vol.38, issue.4, pp.393-422, 2002.
DOI : 10.1016/S1389-1286(01)00302-4

URL : http://www.ijcaonline.org/volume21/number4/pxc3873382.pdf

C. Intanagonwiwat, R. Govindan, D. Estfin, J. Heidemann, and F. Silva, Directed diffusion for wireless sensor networking, IEEE/ACM Transactions on Networking, vol.11, issue.1, pp.2-16, 2003.
DOI : 10.1109/TNET.2002.808417

URL : https://cloudfront.escholarship.org/dist/prd/content/qt62p28371/qt62p28371.pdf

A. Abbasi, J. Wetzels, W. Bokslag, E. Zambon, and S. Etalle, On Emulation-Based Network Intrusion Detection Systems, pp.384-404, 2014.
DOI : 10.1007/978-3-319-11379-1_19

M. Polychronakis, K. G. Anagnostakis, and E. P. Markatos, Network?Level Polymorphic Shellcode Detection Using Emulation, pp.54-73, 2006.
DOI : 10.1007/s11416-006-0031-z

URL : http://s3g-mirror.malware-dmz.org/papers/nemu-dimva06.pdf

N. Antunes and M. Vieira, Defending against Web Application Vulnerabilities, Computer, vol.45, issue.2, pp.66-72, 2012.
DOI : 10.1109/MC.2011.259

J. Clarke and R. M. Alvarez, SQL Injection Attacks and Defense Available: http://www.amazon.com/Injection-Attacks-Defense-Justin-Clarke, 2009.

H. Shahriar and M. Zulkernine, Information-Theoretic Detection of SQL Injection Attacks, 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering, pp.40-47, 2012.
DOI : 10.1109/HASE.2012.31

V. H. La and A. R. Cavalli, Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey, International Journal on AdHoc Networking Systems (IJANS), pp.1-20, 2014.

A. K. Salman-bin-abdulaziz, Survey on security attacks in Vehicular Ad hoc Networks (VANETs), 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp.1-9, 2012.

J. P. Raya, Securing vehicular ad hoc networks, Journal of Computer Security, pp.39-68, 2007.
DOI : 10.3233/JCS-2007-15103

C. T. Wing, Secure and Privacy-preserving Protocols for VANETs, 2011.

L. Zhang, Research on Security and Privacy in Vehicular Ad Hoc Networks, 2010.