1. Specification of GERAN vulnerabilities (2007),
http://www.3gpp.org/ftp/Specs/html-info/33801.htm
2. Abdulla, P.A., Čerāns, K., Jonsson, B., Tsay, Y.: Algorithmic analysis of programs with well quasi-ordered domains. Inf. Comput. 160(1-2) (2000)
3. Isograph AttackTree+ (2007),
http://www.isograph-software.com/atpover.htm
4. Lecture Notes in Computer Science;S. Bistarelli,2007
5. Bistarelli, S., Fioravanti, F., Peretti, P.: Defense tree for economic evaluations of security investment. In: ARES 2006, pp. 416–423. IEEE Computer Society, Los Alamitos (2006)