R. Slavin and J. Niu, Security patterns repository, 2017.

M. Schumacher, Security Engineering with Patterns: Origins, Theoretical Models, and New Applications, 2003.

A. Morais, E. Martins, A. Cavalli, and W. Jimenez, Security protocol testing using attack trees, 2009 International Conference on Computational Science and Engineering, vol.2, pp.690-697, 2009.
DOI : 10.1109/cse.2009.206

A. Marback, H. Do, K. He, S. Kondamarri, and D. Xu, A threat model-based approach to security testing, Softw. Pract. Exper, vol.43, issue.2, pp.241-258, 2013.
DOI : 10.1002/spe.2111

URL : http://www.cs.ndsu.nodak.edu/~hdo/pdf_files/spe12.pdf

N. Shahmehri, A. Mammar, E. Montes-de, D. Oca, A. Byers et al., An advanced approach for modeling and detecting software vulnerabilities, Inf. Softw. Technol, vol.54, issue.9, pp.997-1013, 2012.
DOI : 10.1016/j.infsof.2012.03.004

URL : https://hal.archives-ouvertes.fr/hal-00739075

S. Salva and L. Regainia, Using data integration for security testing, Proceedings 29th International Conference, pp.178-194, 2017.
DOI : 10.1007/978-3-319-67549-7_11

URL : https://hal.archives-ouvertes.fr/hal-01678954

M. Yoshizawa, T. Kobashi, H. Washizaki, Y. Fukazawa, T. Okubo et al., Verifying implementation of security design patterns using a test template, 2014 Ninth International Conference on Availability, Reliability and Security, pp.178-183, 2014.
DOI : 10.1109/ares.2014.31

B. Kordy, S. Mauw, S. Radomirovi´cradomirovi´c, and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, p.29, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01825088

R. Grønmo and B. Møller-pedersen, From sequence diagrams to state machines by graph transformation, Theory and Practice of Model Transformations, pp.93-107, 2010.

F. U. Muram, H. Tran, and U. Zdun, Automated mapping of UML activity diagrams to formal specifications for supporting containment checking, Proceedings 11th International Workshop on Formal Engineering approaches to Software Components and Architectures, pp.93-107, 2014.