1. Howard and Lipner . 2006. The security development lifecycle . Redmond : Microsoft Press . Howard and Lipner. 2006. The security development lifecycle. Redmond: Microsoft Press.
2. M. Howard and S. Lipner. 2006. The Security Development Lifecycle. Microsoft Press. M. Howard and S. Lipner. 2006. The Security Development Lifecycle. Microsoft Press.
3. Johnstone. 2010 . Threat modeling with Stride and UML . In Proceedings of the 8th Australian Information Security Management Conference. Johnstone. 2010. Threat modeling with Stride and UML. In Proceedings of the 8th Australian Information Security Management Conference.
4. OWASP. 2018. Application Threat Modeling. https://www.owasp.org/index.php/Application_Threat_Modeling OWASP. 2018. Application Threat Modeling. https://www.owasp.org/index.php/Application_Threat_Modeling
5. Schaad and Borozdin . 2012 . TAM 2: automated threat analysis . In Proceedings of the 27th Annual ACM Symposium on Applied Computing. Schaad and Borozdin. 2012. TAM 2: automated threat analysis. In Proceedings of the 27th Annual ACM Symposium on Applied Computing.