1. Paech B, Kerkow D (2004) Non-functional requirements engineering: quality is essential. In: Regnell B, Kamsties E, Gervasi V (eds) Proceedings of the 10th international workshop on requirements engineering: foundation of software quality—REFSQ 04, Essener Informatik Beiträge Bd 9, Essen, pp 237–250
2. Sindre G, Opdahl AL (2001) Templates for misuse case description. In: Proceedings of the 7th international workshop on requirements engineering: foundation of software quality—REFSQ 01, Essener Informatik Beiträge Bd.6, Essen, pp 125–136
3. Sindre G, Firesmith DG, Opdahl AL (2003) A reuse based approach to determining security requirements. In: Proceedings of the 9th international workshop on requirements engineering: foundation of software quality—REFSQ 03, Essener Informatik Beiträge Bd.8, Essen, pp 37–46
4. Herrmann A, Paech B (2005) Quality misuse. In: Kamsties E, Gervasi V, Sawyer P (eds) Proceedings of the 11th international workshop on requirements engineering: foundation of software quality—REFSQ 05, Essener Informatik Beiträge Bd. 10, Essen, pp 193–199
5. Kazman R, Klein M, Clements P (2000) ATAM: method for architecture evaluation. CMU/SEI-2000-TR-004, Software Engineering Institution, Carnegie Mellon University