1. Lecture Notes in Computer Science;M Atzeni,2017
2. Berger, B.J., Sohr, K., Koschke, R.: Extracting and analyzing the implemented security architecture of business applications. In: Proceedings of the CSMR, pp. 285–294. IEEE (2013)
3. Bettini, L.: Implementing Domain-Specific Languages with Xtext and Xtend. Packt Publishing, Birmingham (2013)
4. Lecture Notes in Computer Science;J Bézivin,2005
5. Bézivin, J., Jouault, F., Valduriez, P.: On the need for megamodels. In: Proceedings of the OOPSLA/GPCE: Best Practices for Model-Driven Software Development workshop (2004)