A. Kiel, What do we know about "Industry 4.0" so far? Proceedings of the International As-sociation for Management of Technology, 2017.

M. Hermann, T. Pentek, and B. Otto, Design Principles for Industrie 4.0 Scenarios, 49th Hawaii International Conference on System Sciences (HICSS), pp.3928-3937, 2016.

R. Waslo, T. Lewis, R. Hajj, and R. Carton, Industry 4.0 and cybersecurity Managing risk in an age of connected production

B. Motyl, G. Baronio, S. Uberti, D. Speranza, and S. Filippi, How will Change the Future Engineers' Skills in the Industry 4.0 Framework? A Questionnaire Survey, Procedia Manufacturing, vol.11, pp.1501-1509, 2017.

R. Dove, J. Bayuk, B. Wilson, and K. Kepchar, , 2016.

Y. Kim, Activities of Security Engineering in System Development Life Cycle: Security Engineer's View, presented at the 14th International Conference on Applications of Computer Engineering (ACE '15), 2015.

D. Shreyas, Software Engineering for Security: Towards Architecting Secure Software, 2001.

N. Haridas, Software Engineering -Security as a Process in the SDLC. SANS Institute InfoSec Reading Room, 2007.

S. Morgan, IBM's CEO On Hackers: Cyber Crime Is The Greatest Threat To Every Company In The World, 2015.

E. Tamura, Hewlett Packard Enterprise Leads Transformation of Cyber Defense with, Build it In" and "Stop it Now, 2016.

W. Newhouse, S. Keith, B. Scribner, and G. Witte, National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, Special Publication 800-181, p.2017, 2017.

R. L. Kissel, K. M. Stine, M. A. Scholl, H. Rossman, J. Fahlsing et al., Security Considerations in the System Development Life Cycle, NIST Special Publication 800-64, NIST2008, 2018.

M. Dawson, D. Burrell, E. Rahim, and S. Brewster, Integrating Software Assurance into the Software Development Life Cycle (SDLC), Journal of Information Systems Technology & Planning, vol.3, issue.6, pp.49-53, 2010.

L. O. Mailloux, C. Garrison, R. Dove, and R. C. Biondo, Guidance for Working Group Maintenance of the Systems Engineering Body of Knowledge (SEBoK) with Systems Security Engineering Example, INCOSE International Symposium, vol.25, pp.1004-1019, 2015.

P. Salini and S. Kanmani, Survey and analysis on Security Requirements Engineering, Computers & Electrical Engineering, vol.38, issue.6, pp.1785-1797, 2012.

S. Evans, D. Heinbuch, E. Kyle, J. Piorkowski, and J. Wallner, Risk-based systems security engineering: stopping attacks with intention, IEEE Security & Privacy, vol.2, issue.6, pp.59-62, 2004.

I. Iso and . Ieee, Systems and software engineering --System life cycle processes, ISO/IEC/IEEE 15288 First edition 2015-05-15, pp.1-118, 2015.

G. S. Parnell, P. J. Driscoll, and D. Henderson, Decision Making in Systems Engineering and Management (Systems Engineering and Management), p.497, 2011.

A. P. Sage and W. Rouse, Handbook of systems engineering and management (Wiley series in Systems Engineering and Management, 2009.

D. D. Walden, G. J. Roedler, K. J. Forsberg, R. D. Hamelin, and T. M. Shortell, INCOSE Systems Engineering Handbook: A Guide for System Life Cycle Processes and Activities, 2015.

I. Sommerville, Software Engineering, Six Edition, 2001.

P. Nejib, D. Beyer, and E. Yakabovicz, Systems Security Engineering: What Every System Engineer Needs to Know, INCOSE International Symposium, vol.27, pp.434-445, 2017.
DOI : 10.1002/j.2334-5837.2017.00370.x

K. M. Zemrowski, NIST Bases Flagship Security Engineering Publication on ISO/IEC/IEEE 15288:2015, Computer, vol.49, pp.86-88, 2016.
DOI : 10.1109/mc.2016.373

S. Türpe, The Trouble with Security Requirements, IEEE 25th International Requirements Engineering Conference, pp.122-133, 2017.

, Guide for Conducting Risk Assessments, NIST, vol.800, p.30, 2012.

B. S. Blanchard and J. E. Blyler, , 2016.

J. L. Bayuk and B. M. Horowitz, An architectural systems engineering methodology for addressing cyber security, Systems Engineering, vol.14, issue.3, pp.294-304, 2011.
DOI : 10.1002/sys.20182

. Von-solms and L. Futcher, Towards the Design of a Cybersecurity Module for Postgraduate Engineering Studies, Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017), 2017.