1. Schoitsch E. Design for safety and security of complex embedded systems: a unified approach. In: Proceedings of the NATO advanced research workshop on cyberspace security and defense, Gdansk, Poland, 2004. p. 161–74.
2. Line MB, Nordland O, Røstad L, Tøndel IA. Safety vs. security? In: Proceedings of the 8th international conference on probabilistic safety assessment and management (PSAM 2006), New Orleans, LA, USA, 2006.
3. Jonsson E, Olovsson T. On the integration of security and dependability in computer systems. In: Proceedings of the IASTED international conference on reliability, quality control and risk assessment, Washington, DC, USA, 1992. p. 93–7.
4. Brewer DFC. Applying security techniques to achieve safety. In: Proceedings of the 3rd safety-critical systems symposium (SSS'93), Bristol, UK, 1993. p. 246–56.
5. Axelrod C. Applying lessons from safety-critical systems to security-critical software. In: Proceedings of the 2011 IEEE long island systems, applications and technology conference (LISAT), Waltham, MA, USA, 2011. p. 1–6.