1. A safety/security risk analysis approach of industrial control systems: A cyber bowtie–combining new version of attack tree with bowtie analysis;Abdo;Computers Security,2018
2. Role-based authorization constraints specification;Ahn;ACM Trans. Inform. System Security (TISSEC),2000
3. Aldemir, T., Stovsky, M., Kirschenbaum, J., Mandelli, D., Bucci, P., Mangan, L., Miller, D., Sun, X., Ekici, E., Guarro, S., et al. (2007). Dynamic reliability modeling of digital instrumentation and control systems for nuclear reactor probabilistic risk assessments. Nureg/Cr-6942. Washington, DC: US Nuclear Regulatory Commission.
4. Stochastic petri nets: An introduction to the theory;Bause;ACM SIGMETRICS Performance Evaluation Review,1998
5. Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems;Cavusoglu;Inform. Syst. Res.,2009