1. CCTA Risk Analysis and Management Method.
www.cramm.com
, October 2013
2. The SecFutur project: Design of Secure and Energy-efficient Embedded Systems for Future Internet Application.
http://www.secfutur.eu
3. IEC/ISO 31010 - Risk Management - Risk Assessment Techniques (2009)
4. DHS Risk Lexicon. Technical report, DHS Risk Steering Committee (2010)
5. Almasizadeh, J., Azgomi, M.A.: A stochastic model of attack process for the evaluation of security metrics. J. Compt. Networks 57(10), 2159–2180 (2013). (Elsevier)