1. Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., Zhan, Y., 2012. Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing. In: 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops. pp. 124–129. http://dx.doi.org/10.1109/ISORCW.2012.31.
2. Security Assurance Cases: Motivation and the State of the Art;Alexander,2011
3. ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system;Beckers;Eng. Secure Future Internet Serv. Syst.: Curr. Res.,2014
4. Vulnerabilities and safety assurance methods in cyber-physical systems: A comprehensive review;Bolbot;Reliab. Eng. Syst. Saf.,2019
5. Co-engineering of safety and security life cycles for engineering of automotive systems;Bramberger;ACM SIGAda Ada Lett.,2020