1. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: the spi calculus. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 36–47. ACM (1997)
2. Alhazmi, O.H., Woo, S., Malaiya, Y.K.: Security vulnerability categories in major software systems. In: Rajasekaran, S. (ed.) Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, 9–11 October 2006, Cambridge, MA, USA, pp. 138–143. IASTED/ACTA Press (2006)
3. Anderson, R.: Why information security is hard-an economic perspective. In: ACSAC 2001 Proceedings of the 17th Annual Computer Security Applications Conference, pp. 358–365. IEEE (2001)
4. Lecture Notes in Computer Science;T Antignac,2016
5. Baier, C., Katoen, J.-P., Larsen, K.G.: Principles of Model Checking. MIT Press, Cambridge (2008)