Experimental comparison of attack trees and misuse cases for security threat identification
Information and Software Technology
Andreas L. Opdahl
A Semiotic Approach for Guiding the Visualizing of Time and Space in Enterprise Models
How Good Is a Security Policy against Real Breaches? A HIPAA Case Study