1. A Comparative Study on Information Security Risk Analysis Methods
2. Securing business processes using security risk-oriented patterns
3. Alberts, C. (2005). OCTAVE-S Implementation Guide, Version 1. Software Engineering Institute, Carnegie Mellon University. Retrieved August 12, 2015, from http://repository.cmu.edu/cgi/viewcontent.cgi?article=1478&context=sei
4. Alberts, C., & Dorofee, A. (2001). OCTAVE Criteria, Version 2.0. Software Engineering Institute, Carnegie Mellon University. Retrieved August 12, 2015, from http://repository.cmu.edu/cgi/viewcontent.cgi?article=1217&context=sei
5. Evaluation of information security risks using hybrid assessment model