1. Mayes, K., Markantonakis, K.: Information security best practices. In: Markantonakis, K., Mayes, K. (eds.) Secure Smart Embedded Devices, Platforms and Applications, pp. 119–144. Springer, New York (2013). Part II
2. Hatzivasilis, G., Papaefstathiou, I., Manifavas, C., Papadakis, N.: A reasoning system for composition verification and security validation. In: 6th NTMS 2014, pp. 1–4 (2014)
3. Eguia, I., Del Ser, J.: A meta-heuristically optimized fuzzy approach towards multi-metric security risk assessment in heterogeneous system of systems. In: PECCS, pp. 231–236 (2014)
4. Lecture Notes in Computer Science;M Walter,2006
5. Devices profile for web services, version 1.1.
http://docs.oasis-open.org/ws-dd/dpws/1.1/os/wsdd-dpws-1.1-spec-os.pdf