1. Stride threats in BIP. https://github.com/hakimuga/Threat_Modeling_BIP
2. Amir, P.: The temporal logic of programs. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 46–57. IEEE Computer Society, October 1977
3. Baouya, A., Chehida, S., Bensalem, S., Bozga, M.: Formal modeling and verification of blockchain consensus protocol for IoT systems. In: Proceedings of the 19th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2020, 22–24 September 2020, vol. 327, pp. 330–342. IOS Press (2020)
4. van den Berghe, A., Yskout, K., Scandariato, R., Joosen, W.: A lingua franca for security by design. In: 2018 IEEE Cybersecurity Development (SecDev), pp. 69–76 (2018)
5. Chondamrongkul, N., Sun, J., Warren, I.: PAT approach to architecture behavioural verification, pp. 187–192, July 2019