1. Brandon Broadnax, Pascal Birnstill, Jörn Müller-Quade, and Jürgen Beyerer. 2016. Eliciting and refining requirements for comprehensible security. In Security Research Conference : 11th Future Security, Berlin, September 13--14, 2016. Ed.: O. Ambacher. Fraunhofer Verlag, 323--329. 46.12.03; LK 01.
2. HASTE: Software Security Analysis for Timing Attacks on Clear Hardware Assumption
3. Kathy Charmaz. 2014. Constructing grounded theory (2 ed.). SAGE Publications, London, England.
4. Capturing security requirements for software systems
5. The effect of trust assumptions on the elaboration of security requirements