1. Lamsweerde AV, Brohez S, Landtsheer RD, Janssens D, Informatique DD (2003) From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering. In: Proceedings of the RE03 workshop on requirements for high assurance systems (RHAS03), pp 49–56
2. van Lamsweerde A (2009) Requirements engineering: from system goals to UML models to software specifications. Wiley, Chichester
3. Howard M, Lipner S (2006) The security development lifecycle. Microsoft Press, Redmond, WA
4. Mcgraw G (2006) Software security: building security. Addison-Wesley Professional, Boston, NY
5. Schneier B (2000) Secrets and lies: digital security in a networked world. Wiley, New York