. Iso/iec, Information technology. Security techniques. Systems security engineering. Capability maturity model (SSE- CMM)

. Iso/iec, Information technology. Security techniques. Information security management systems. Overview and vocabulary

, Guide for conducting risk assessments, 2012.

S. Adams, B. Carter, C. Fleming, and P. A. Beling, Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp.490-497, 2018.

. J. Ch, A. Alberts, and . Dorofee, Managing Information Security Risks: The Octave Approach, 2002.

S. Alpers, R. Pilipchuk, A. Oberweis, and R. Reussner, The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling, Communications in Computer and Information Science, pp.109-124, 2019.

S. Bode, A. Fischer, W. Kuhnhauser, and M. Riebisch, Software Architectural Design Meets Security Engineering, 2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp.109-118, 2009.

V. Casola, A. De-benedictis, M. Rak, and U. Villano, A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach, Journal of Systems and Software, vol.163, p.110537, 2020.

M. Security-response and . Center, Seven Deadliest Microsoft Attacks, 2010.

H. Cervantes, R. Kazman, J. Ryoo, D. Choi, and D. Jang, Architectural Approaches to Security: Four Case Studies, Computer, vol.49, issue.11, pp.60-67, 2016.

E. Coatanea and R. Roca, Dimensional Analysis Conceptual Modeling Supporting Adaptable Reasoning in simulation-based training, 2018 13th Annual Conference on System of Systems Engineering (SoSE), pp.245-252, 2018.

H. Cunningham, Gate, a general architecture for text engineering, Computers and the Humanities, vol.36, issue.2, pp.223-254, 2002.

D. Gritzalis, G. Iseppi, A. Mylonas, and V. Stavrou, Exiting the Risk Assessment Maze, ACM Computing Surveys, vol.51, issue.1, pp.1-30, 2018.

R. A. Jones and B. Horowitz, A System-Aware Cyber Security architecture, Systems Engineering, vol.15, issue.2, pp.225-240, 2012.

J. Jürjens, UMLsec: Extending UML for Secure Systems Development, ?UML? 2002 ? The Unified Modeling Language, pp.412-425, 2002.

R. Kumar, S. Schivo, E. Ruijters, B. M. Yildiz, D. Huistra et al., Effective Analysis of Attack Trees: A Model-Driven Approach, Fundamental Approaches to Software Engineering, pp.56-73, 2018.

B. Ruby and . Lee, Security basics for computer architects, Synthesis Lectures on Computer Architecture, vol.8, issue.4, pp.1-111, 2013.

T. Lodderstedt, D. Basin, and J. Doser, SecureUML: A UML-Based Modeling Language for Model-Driven Security, ?UML? 2002 ? The Unified Modeling Language, pp.426-441, 2002.

S. Mauw and M. Oostdijk, Foundations of Attack Trees, Information Security and Cryptology - ICISC 2005, pp.186-198, 2006.

P. Mell, K. Scarfone, and S. Romanosky, The common vulnerability scoring system (CVSS) and its applicability to federal agency systems, 2007.

D. Mellado, E. Fernández-medina, and M. Piattini, A common criteria based security requirements engineering process for the development of secure information systems, Computer Standards & Interfaces, vol.29, issue.2, pp.244-253, 2007.

R. A. Martin and S. Barnum, Common weakness enumeration (CWE) status update, ACM SIGAda Ada Letters, vol.XXVIII, issue.1, pp.88-91, 2008.

A. P. Moore, R. J. Ellison, and R. C. Linger, Attack Modeling for Information Security and Survivability, 2001.

B. A. Cheikes, D. Waltermire, and K. Scarfone, Common platform enumeration :, 2011.

J. L. Peterson, Petri Nets, ACM Computing Surveys, vol.9, issue.3, pp.223-252, 1977.

S. Security-response, Petya ransomware: Here's what you need to know

A. Shostack, Threat Modeling: Designing for Security, 2014.

W. Stallings and L. Brown, Computer Security: Principles and Practice, 2014.

. Techtarget and . Bluekeep, , 2019.

K. Tuma, D. Hosseini, K. Malamas, and R. Scandariato, Inspection guidelines to identify security design flaws, Proceedings of the 13th European Conference on Software Architecture - ECSA '19 - volume 2, vol.2, p.19, 2019.

G. Tziakouris, M. Zinonos, T. Chothia, and R. Bahsoon, Asset-centric Security-Aware Service Selection, 2016 IEEE International Congress on Big Data (BigData Congress), pp.327-332, 2016.

A. Van-den, R. Berghe, K. Scandariato, W. Yskout, and . Joosen, Design notations for secure software: A systematic literature review, Softw. Syst. Model, vol.16, issue.3, pp.809-831, 2017.

. Hans-van-vliet, Software engineering -principles and practice, 2007.