1. AG, S.: Aris - software ag. https://www.ariscommunity.com/
2. Ahola, J., et al.: Handbook of the Secure Agile Software Development Life Cycle. University of Oulu, Finland (2014)
3. Al-Hamdani, W.A.: Three models to measure information security compliance. IJISP 3(4), 43–67 (2009)
4. Beckers, K.: Pattern and Security Requirements. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16664-3
5. Bell, L., Brunton-Spall, M., Smith, R., Bird, J.: Agile Application Security. Enabling Security in a Continuous Delivery Pipeline. O’Reilly, Sebastopol (2017)