1. Octave criteria, version 2.0. Technical report ESC-TR-2001-016;Albert,2001
2. Automated Software Architecture Security Risk Analysis using Formalized Signatures;Almorsy,2013
3. Basic concepts and taxonomy of dependable and secure computing;Avizienis;IEEE Trans Dependable Secure Comput,2004
4. Risk Management;AS/NZS 4360,2004
5. Prioritizing countermeasures through the countermeasure method for software security (cm-sec). Product-Focused Software Process Improvement;Baca,2010