1. A quantitative CVSS-based cyber security risk assessment methodology for IT systems;Aksu,2017
2. Modeling dependencies in security risk management;Alpcan,2009
3. Ammann, P., Wijesekera, D., Kaushik, & S. Scalable, Graph-based network vulnerability analysis. In Proceedings of the 9th Conference on Computer and Communications Security, USA, 2002, pp. 217–224.
4. MAGERIT– ver. 3;Amutio,2014
5. ANSSI. (2010). Ebios 2010- Expression of needs and identification of security objectives.