1. Lecture Notes in Computer Science;P. Bieber,2011
2. Bieber, P., Seguin, C.: Safety Analysis of Embedded Systems with the AltaRica Approach. In: Industrial Use of Formal Methods: Formal Verification, ch. 3. Wiley (2013)
3. Blanquart, J.-P., Bieber, P., Descargues, G., Hazane, E., Julien, M., Leonardon, L.: Similarities and dissimilarities between safety levels and security levels. In: Proceedings of the Embedded Real-Time Systems and Software Conference (ERTS2 2012) (2012)
4. Bozzano, M., Villafiorita, A., Aakerlund, O., Bieber, P., Bougnol, C., Böde, E., Bretschneider, M., Cavallo, A., Castel, C., Cifaldi, M., Cimatti, A., Griffault, A., Kehren, C., Lawrence, B., Luedtke, A., Metge, S., Papadopoulos, C., Passarello, R., Peikenkamp, T., Persson, P., Seguin, C., Trotta, L., Valacca, L., Zacco, G.: Esacs: an integrated methodology for design and safety analysis of complex systems. In: Proceedings of ESREL 2003. Balkema Publisher (2003)
5. Kordy, B., Mauw, S., Radomirovic, S., Schweitzer, P.: Attack-defense trees. Journal of Logic and Computation 24, 55–87 (2012)