1. Abdalla, R., Niall, K.: Location-Based Critical Infrastructure Interdependency (LBCII), Technical Report, DRDC Toronto TR 2009–130, Defence R&D Canada, Toronto, Canada (2010).
cradpdf.drdc-rddc.gc.ca/PDFS/unc100/p.533788_A1b.pdf
2. Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks, in Principles of Security and Trust, M. Abadi and S. Kremer (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 285–305 (2014)
3. Bagnato, A., Kordy, B., Meland, P., Schweitzer, P.: Attribute decoration of attack-defense trees, International Journal of Secure Software Engineering, vol. 3(2), pp. 1–35 (2012)
4. Bashan, A., Berezin, Y., Buldyrev, S., Havlin, S.: The extreme vulnerability of interdependent spatially embedded networks, Nature Physics, vol. 9(10), pp. 667–672 (2013)
5. Beccuti, M., Franceschinis, G., Kaaniche, M., Kanoun, K.: Multilevel dependability modeling of interdependencies between the electricity and information infrastructures, in Critical Information Infrastructure Security, R. Setola and S. Geretshuber (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 48–59 (2009)