1. Hernan, S., Lambert, S., Ostwald, T., et al.: Threat modeling-uncover security design flaws using the stride approach. MSDN Mag.-Louisville 68–75 (2006)
2. Schneier, B.: Attack trees—modeling security threats. Dr, Dobb’s J. 24 (1999)
3. Ericson, C.A.: Fault tree analysis. Hazard Anal. Tech. Syst. Saf. 183–221 (2005)
4. Ortalo, R., Deswarte, Y., Kaaniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Softw. Eng. 25(5), 633–650 (1999)
5. Phillips, C., Swiler, L.P.: A Graph-Based System for Network-Vulnerability Analysis, 1998. ACM (1998)