1. Nancy, R.M.: SQUARE Process. Software Engineering Institute. Carnegie Mellon University (2006)
2. Alexander: Misuse cases: Use cases with hostile intent. IEEE Software, 58–66 (2003)
3. McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Annual Computer Security Applications Conference, ACSAC 1999, pp. 55–64 (1999)
4. Lecture Notes in Artificial Intelligence;C.S. Seong,2005
5. Lecture Notes in Computer Science;R. Alfonso,2006