1. [1] "Directive (EU) 2016/1148 of The European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union", The European Parliament and the Council of the European Union, Official Journal of the European Union, vol. 59, pp. L194/1- L194/30, 2016 [Online]. Available: https://eur-lex.europa.eu/ legal-content/EN/TXT/PDF/?uri=CELEX:32016L1148&from=EN
2. [2] IEC/ISO 31010 "Risk management - Risk assessment techniques", International Organization for Standardization, International Electrotechnical Commission, Geneva, 2009 [Online]. Available: https://www.iso.org/obp/ui#iso:std:iec:31010:ed-1:v1:en
3. [3] S. Szwaczyk, K. Wrona, and M. Amanowicz, "Applicability of risk analysis methods to risk-aware routing in software-defined networks", in Proc. Int. Conf. on Milit. Commun. and Inform. Syst. ICMCIS 2018, Warsaw, Poland, 2018 (doi: 10.1109/ICMCIS.2018.8398688).
4. [4] M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming. Wiley, 2014 (ISBN: 9780471619772).
5. [5] A. Afful-Dada and T. T. Allen, "Data-driven cyber-vulnerability maintenance policies", J. of Qual. Technol., vol. 46, pp. 234-250, 2014 (doi: 10.1080/00224065.2014.11917967).