1. Elahi, G., Yu, E.: Modeling and analysis of security trade-offs – a goal oriented approach. ftp://www.cs.toronto.edu/dist/eric/ER07-Elahi.pdf. Accessed 21 May 2019
2. Despotou, G., Kelly, T.: Design and development of dependability case architecture during system development.
https://pdfs.semanticscholar.org/f8e4/6d38a451a56a4d588ca6533dbec7d52979e2.pdf
. Accessed 21 May 2019
3. Despotou, G., McDermid, J., Kelly, T.: using scenarios to identify and trade-off dependability objectives in design.
https://www-users.cs.york.ac.uk/tpk/issc05b.pdf
. Accessed 21 May 2019
4. Trade-off examples inside software engineering and computer science.
https://pdfs.semanticscholar.org/d671/e1fce79502df40d424b94790444300f0d291.pdf
. Accessed 21 July May 2019
5. Bernardi, S., Merseguer, J., Petriu, D.C.: dependability modeling and assessment in UML-based software development.
http://www.sce.carleton.ca/faculty/petriu/papers/BMP11-prepub.pdf
. Accessed 21 May 2019