1. Park, S.C., Ko, M., Chang, M.: A reverse engineering approach to generate a virtual plant model for PLC simulation. Int. J. Adv. Manuf. Technol. 69, 2459–2469 (2013). Springer
2. El-Attar, M.: From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design: Softw. Syst. Model. 13, 173–190 (2012). Springer
3. Ranjitha Kumari, S., Panthi, V., Prasad Mohapatra, D., Kumar Behera, P.: Prioritizing test scenarios from UML communication and activity diagrams. Innov. Syst. Softw. Eng. 10, 165–180 (2014). Springer
4. Hofstede, A., Mecella, M., Sardina S.: Special issue on: knowledge-intensive business processes. J. Data Semant. 4 (2015). Springer
5. Nagamouttou, D., Egambaram, L., Krishnan, M., Narasingam, P.: A verification strategy for web services composition using enhanced stacked automata model. SpringerPlus 4, 1–13. (2015). Springer