I. Rouf, R. Miller, T. Mustafa, S. Taylor, W. Oh et al., Seskar: Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study, Proceedings of the 19th USENIX conference on Security, 2010.

B. Schneier, Attack trees. Dr. Dobb's, Journal, 1999.

A. Zimmermann, R. German, J. Freiheit, and G. , Hommel: TimeNET 3.0 Tool Description . Int. Conf. on Petri Nets and Performance Models, 1999.

H. R. Watson, Launch control safety study, Bell Labs, 1961.

B. Kaiser, C. Gramlich, and M. Förster, State/event fault trees -A safety analysis model for software-controlled systems, Proceedings of the 23rd Int. Conference on Computer Safety, Reliability, and Security, 2004.

L. Piètre-cambacédès and M. Bouissou, Modeling safety and security interdependencies with BDMP (Boolean logic Driven Markov Processes), 2010 IEEE International Conference on Systems, Man and Cybernetics, 2010.
DOI : 10.1109/ICSMC.2010.5641922

M. Steiner, P. Keller, and P. , Liggesmeyer: Modeling the Efects of Software on Safety and Reliability in Complex Embedded Systems, Computer Safety, Reliability and Security, 2012.

P. J. Brook and R. F. Paige, Fault Trees for Securiy System Design and Analysis, 2003.

Z. Benenson, E. O. Blaÿ, and F. , Freiling: Attacker Models for Wireless Sensor Networks. IT -Information Technology, 2010.

R. Vigo, The Cyber-Physical Attacker, Computer Safety, Reliability and Security
DOI : 10.1007/978-3-642-33675-1_31

I. N. Fovino and M. Masera, Through the Description of Attacks: A Multidimensional View, Proceedings of the 25th Int. Conference on Computer Safety, Reliability, and Security, 2006.
DOI : 10.1007/11875567_2

E. Lemay, M. D. Ford, K. Keefe, W. H. Sanders, and C. , Muehrcke: Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE), Proceedings of the Int. Conference on Quantitative Evaluation of Systems, 2011.