1. 2011 CWE/SANS top 25: monster mitigations. http://cwe.mitre.org/19/mitigations.html. Accessed 15 Nov 2014
2. Bryant E, Early J, Gopalakrishna R, Roth G, Spafford EH, Watson K, Williams P, Yost S (2003) Poly2 paradigm: a secure network service architecture. Proc. 19th Annual Computer Security Applications Conference (ACSAC 2003), IEEE, 10 p
3. Smith RE (2012) A contemporary look at Saltzer and Schroeder’s 1975 design principles. November/December 2012, IEEE Computer and Reliability Societies
4. Mohsin M, Khan MU (2019) UML-SR: a novel security requirements specification language. 2019 IEEE 19th International Conf. on Software Quality, Reliability and Security (QRS), IEEE pp. 342–348
5. Tarala J, Tarala KK (2015) Open threat taxonomy, version 1.1. Enclave Security, Venice Florida, pp 1–15