1. Ajay Chakravarthy Xiaoyu Chen Bassem Nasser and Michael Surridge. 2015. Trustworthy systems design using semantic risk modelling. (February 2015). https://eprints.soton.ac.uk/383465/ Ajay Chakravarthy Xiaoyu Chen Bassem Nasser and Michael Surridge. 2015. Trustworthy systems design using semantic risk modelling. (February 2015). https://eprints.soton.ac.uk/383465/
2. Jin-Hee Cho etal 2015. A Survey on Trust Modeling. ACM Comput. Surv. 48 2 Article 28 (Oct. 2015) 40 pages. 10.1145/2815595 Jin-Hee Cho et al. 2015. A Survey on Trust Modeling. ACM Comput. Surv. 48 2 Article 28 (Oct. 2015) 40 pages. 10.1145/2815595
3. Foreseeti. 2018. SECURICAD. https://www.foreseeti.com/. Foreseeti. 2018. SECURICAD. https://www.foreseeti.com/.
4. Per Hakon et al. 2008. SeaMonster: Providing tool support for security modeling. Per Hakon et al. 2008. SeaMonster: Providing tool support for security modeling.
5. ISO. 2009. ISO 31010: Risk management - Risk assessment techniques. https://www.iso.org/standard/51073.html. ISO. 2009. ISO 31010: Risk management - Risk assessment techniques. https://www.iso.org/standard/51073.html.