1. Survey on information system security risk management alignment
2. N. Ahmed and R. Matulevicius. 2014. A Method for Eliciting Security Requirements from the Business Process Models.. In CAiSE (Forum/Doctoral Consortium). 57–64. N. Ahmed and R. Matulevicius. 2014. A Method for Eliciting Security Requirements from the Business Process Models.. In CAiSE (Forum/Doctoral Consortium). 57–64.
3. An Extension of Business Process Model and Notation for Security Risk;Altuhhova Olga;Management. Int. J. Inf. Syst. Model. Des.,2013