1. Jajodia, S., Noel, S.: Advanced cyber attack modeling, analysis, and visualization. Technical Report AFRL-RI-RS-TR-2010-078. Final Technical Report, George Mason University (2010)
2. Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur. 13(1), 4:1–4:40 (2009)
3. Chen, B., Kalbarczyk, Z., Nicol, D.M., Sanders, W.H., Tan, R., Temple, W.G., Tippenhauer, N.O., Vu, A.H., Yau, D.K.: Go with the flow: toward workflow-oriented security assessment. In: Proceedings of the 2013 Workshop on New Security Paradigms Workshop, NSPW ‘13, pp. 65–76 (2013)
4. Bhave, A., Krogh, B., Garlan, D., Schmerl, B.: View consistency in architectures for cyber-physical systems. In: Proceedings of 2nd ACM/IEEE International Conference on Cyber-Physical Systems (2011)
5. Sommestad, T., Ekstedt, M., Johnson, P.: Cyber security risks assessment with Bayesian Defense graphs and architectural models. In: 42nd Hawaii International Conference on System Sciences, pp. 1–20 (2009)