1. Schneier, B.: Attack trees: modeling security threats. Dr. Dobb’s J. (1999)
2. Schneier, B.: Secrets & Lies: Digital Security in a Networked World. Wiley, New York (2000)
3. Cremonini, M., Martini, P.: Evaluating information security investments from attackers perspective: the return-on-attack (ROA). In: Proceedings of 4th Workshop on the Economics of Information Security (2005)
4. Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy- preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)
5. Freudiger, J., Raya, M., Felegyhazi, M.: Mix-zones for location privacy in vehicular networks. In: Proceedings of ACM WiN-ITS 2007 (2007)