1. ANSSI: Ebios risk manager - the method (2019). https://www.ssi.gouv.fr/en/guide/ebios-risk-manager-the-method/
2. Breier, J., Schindler, F.: Assets dependencies model in information security risk management. In: Linawati, M.M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) Information and Communication Technology-EurAsia Conference, pp. 405–412. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55032-4_40
3. Cristani, M., Cuel, R.: A survey on ontology creation methodologies. Int. J. Semant. Web and Inf. Syst. (IJSWIS) 1(2), 49–69 (2005)
4. Depoy, J., Phelan, J., Sholander, P., Smith, B., Varnado, G., Wyss, G.: Risk assessment for physical and cyber attacks on critical infrastructures. In: IEEE Military Communications Conference, pp. 1961–1969 (2005)
5. ENISA: Cyber security and resilience for Smart Hospitals (2016). https://www.enisa.europa.eu/publications/cyber-security-and-resilience-for-smart-hospitals