1. Allen, C., 2016. Self-sovereign identity principles. https://github.com/ChristopherA/self-sovereign-identity/blob/master/self-sovereign-identity-principles.md.
2. Amenaza.com, 2021. The SecurITree advantage. https://www.amenaza.com/SS-advantage.php.
3. What’s wrong with risk matrices?;Anthony (Tony) Cox;Risk Anal.,2008
4. Time-dependent analysis of attacks;Arnold,2014
5. Auditboard.com, 2021. What is a risk assessment matrix? And why is it important?https://www.auditboard.com/blog/what-is-a-risk-assessment-matrix/.