1. Aagedal, J.Ø.
,
Braber, F.
,
Den, Dimitrakos, T.
,
Gran, B.A.
,
Raptis, D.
and
Stølen, K.
(2002), “Model-based risk assessment to improve enterprise security”, Proceedings of the Fifth International IEEE Conference on Distributed Object Computing (EDOC 2002), Lausanne, pp. 51-62.
2. Albert, C.
and
Dorofee, A.J.
(2001),
OCTAVE Criteria Version 2.0
, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
3. Alberts, C.J.
and
Dorofee, A.J.
(2002),
Managing Information Security Risks: The Octave Approach
, Addison Wesley Longman Publishing Co., Boston, MA, pp. 1-512.
4. Alberts, C.J.
,
Dorofee, A.J.
and
Allen, J.H.
(2001),
OCTAVE Catalog of Practices Version 2.0
, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
5. Alberts, C.
,
Dorofee, A.
,
Stevens, J.
and
Woody, C.
(2003),
Introduction to the OCTAVE® Approach – Networked Systems Survivability Program
, Software Engineering Institute, Carnegie Mellon University, pp. 1-27.