1. Bender, G., Kot, L., Gehrke, J.: Explainable security for relational databases. In: Dyreson, C.E., Li, F., Özsu, M.T. (eds.) International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, 22–27 June, 2014, pp. 1411–1422. ACM (2014)
2. Cappelli, D.M., Moore, A.P., Trzeciak, R.F.: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). SEI Series in Software Engineering. Addison-Wesley Professional, 1st edn., February 2012
3. CHIST-ERA. Success: Secure accessibility for the internet of things (2016). http://www.chistera.eu/projects/success
4. Kammüller, F.: Formalizing probabilistic quantum security protocols in the isabelle infrastructure framework. Informal Presentation at Computability in Europe, CiE (2019)
5. Kammüller, F.: Formal models of human factors for security and privacy. In: 5th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2017. LNCS, vol. 10292, pp. 339–352. Springer (2017). Affiliated with HCII 2017