Sean Bechhofer (2009):
OWL: Web ontology language.
In: Encyclopedia of Database Systems.
Springer,
pp. 2008–2009,
doi:10.1007/978-0-387-39940-9_1073.
Seyit Ahmet Camtepe & Bülent Yener (2007):
Modeling and detection of complex attacks.
In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007).
IEEE,
pp. 234–243,
doi:10.1109/SECCOM.2007.4550338.
A. Ekelhart, S. Fenz, M. Klemen & E. Weippl (2007):
Security Ontologies: Improving Quantitative Risk Analysis.
In: 40th Annual Hawaii International Conference on System Sciences,
40th Annual Hawaii International Conference on System Sciences (HICSS'07),
pp. 156a,
doi:10.1109/HICSS.2007.478.
R. Fikes, P. Hayes & I. Horrocks (2004):
OWL-QL – A language for deductive query answering on the Semantic Web.
Journal Web Semantics: Science, Services and Agents on the World Wide Web,
pp. 19–29,
doi:10.1016/j.websem.2004.07.002.
V. Haarslev & R. Moller (2003):
RACER: An OWL Reasoning Agent for the Semantic Web.
In: 1st International Workkshop on Applications, Products and Services of Web-based Support Systems (WCC'03),
pp. 91–95.
J. Holt & S. Perry (2007):
SysML for System Engineering (Professional Applications of Computing) 7.
IET.
I. Horrocks, P. F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof & M. Dean (2004):
SWRL: A Semantic Web Rule Language Combining OWL and RuleML.
Available at http://www.w3.org/Submission/2004/SUBM-SWRL-20040521/.
M. Sabir Idrees, Y. Roudier, L. Apvrille & G. Pedroza (2011):
Test Results.
Technical Report D4.4.2.
EVITA Project.
M. Jackson (2001):
Problem Frames: Analyzing and Structuring Software Development Problems.
Addison-Wesley Professional.
J. Jüerjens (2003):
Secure Systems Development with UML.
Springer,
doi:10.1007/b137706.
A. Kim, J. Luo & M. Kang (2005):
Security Ontology for Annotating Resources.
In: Proceedings of the 2005 OTM Confederated international conference on the Move to Meaningful Internet Systems (OTM'05),
pp. 1483–1499,
doi:10.1007/11575801_34.
TELECOM ParisTech LabSoc:
The TURTLE Toolkit - TTool.
Available at http://labsoc.comelec.enst.fr/turtle/ttool.html.
A. van Lamsweerde & E. Letier (2004):
From Object Orientation to Goal Orientation: A Paradigm Shift for Requirements Engineering.
In: 9th International Workshop on Radical Innovations of Software and System Engineering (RISSEF 2002),
pp. 325–340,
doi:10.1007/978-3-540-24626-8_23.
L. Lin, B. Nuseibeh, D. Ince, M. Jackson & J. Moffett (2003):
Introducing Abuse Frames for Analysing Security Requirements.
In: Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE'03),
pp. 371–372,
doi:10.1109/icre.2003.1232791.
H. Mouratidis, P. Giorgini, G. Manson & I. Philp (2002):
A Natural Extension of Tropos Methodology for Modelling Security.
In: Proceedings of the Agent Oriented Methodologies Workshop (OOPSLA'02).
M. J. O'Connor & A. K. Das (2009):
SQWRL: A Query Language for OWL.
In: Proceedings of the 5th International Workshop on OWL: Experiences and Directions,
OWLED'09.
E. Prud'hommeaux & A. Seaborne (2008):
SPARQL Query Language for RDF.
Available at http://www.w3.org/TR/2008/REC-rdf-sparql-query-20080115/.
Yves Roudier, Muhammad Sabir Idrees & Ludovic Apvrille (2013):
Towards the model-driven engineering of security requirements for embedded systems.
In: International Workshop on Model-Driven Requirements Engineering (MODRE 2013),
doi:10.1109/MoDRE.2013.6597264.
A. Ruddle, D. Ward, B. Weyl, S. Idrees, Y. Roudier, M. Friedewald, T. Leimbach, A. Fuchs, S. Gürgens, O. Henniger, R. Rieke, M. Ritscher, H. Broberg, L. Apvrille, R. Pacalet & G. Pedroza (2009):
Security requirements for automotive on-board networks based on dark-side scenarios.
Technical Report Deliverable D2.3.
EVITA Project.
B. Schneier (1999):
Attack trees.
Dr. Dobb's journal 24(12),
pp. 21–29.
G. Sindre & A. L. Opdahl (2000):
Eliciting Security Requirements by Misuse Cases.
In: Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems,
TOOLS-Pacific'00,
pp. 120–131,
doi:10.1109/TOOLS.2000.891363.
J. Stefan & M. Schumacher (2002):
Collaborative Attack Modeling.
In: Proceedings of the 2002 ACM Symposium on Applied Computing,
SAC'02,
pp. 253–259,
doi:10.1145/508832.508843.
Stanford University:
Protégé Ontology Editor and Knowledge-base Framework.
Available at http://protege.stanford.edu/.
A. van Lamsweerde (2007):
Engineering Requirements for System Reliability and Security.
In: Software System Reliability and Security,
NATO Security through Science Series - Information and Communicarion Security,
pp. 196–238.
G. Vigna, S. Eckmann & R. Kemmerer (2000):
Attack Languages.
In: Proceedings of the IEEE Information Survivability Workshop,
ISW'00,
pp. 163–166.
J. Whittle, D. Wijesekera & M. Hartong (2008):
Executable misuse cases for modeling security concerns.
In: Proceedings of the 30th international conference on Software engineering,
ICSE'08,
pp. 121–130,
doi:10.1145/1368088.1368106.