R. Barber, Hackers Profiled ??? Who Are They and What Are Their Motivations?, Computer Fraud & Security, vol.2001, issue.2, pp.14-17, 2001.
DOI : 10.1016/S1361-3723(01)02017-6

J. Gao, B. Zhang, X. Chen, and Z. Luo, Ontology-based model of network and computer attacks for security assessment, Journal of Shanghai Jiaotong University (Science), vol.27, issue.2, pp.554-562, 2013.
DOI : 10.1007/s12204-013-1439-5

M. Gerber and R. , Solms: Management of risk in the information age, Computer & Security, vol.14, pp.16-30, 2005.

L. Grunske and D. , Juoyce: Quantitative risk-based security prediction for componentbased systems with explicity modeled attack profiles, Journal of Systems and Software, vol.81, issue.8, p.13271345, 2008.

B. Ksiezopolski, B. , and Z. Kotulski, Adaptable security mechanism for dynamic environments, Computers & Security, vol.26, issue.3, pp.246-255, 2007.
DOI : 10.1016/j.cose.2006.11.002

B. Ksiezopolski and . Qop-ml, QoP-ML: Quality of protection modelling language for cryptographic protocols, Computers & Security, vol.31, issue.4, pp.569-596, 2012.
DOI : 10.1016/j.cose.2012.01.006

B. Ksiezopolski, D. Rusinek, and A. Wierzbicki, On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML), LNCS, vol.7804, pp.261-270, 2013.
DOI : 10.1007/978-3-642-36818-9_27

URL : https://hal.archives-ouvertes.fr/hal-01480233

M. K. Rogers, K. Seigfried, and K. , Tidke: Self-reported computer criminal behavior: A psychological analysis: Digital Investigation 3, p.116120, 2006.

L. Othmane, H. Weffers, and M. , Klabbers: Using Attacker Capabilities and Motivations in Estimating Security Risk, SOUPS, 2013.

O. Sheyner, J. Haines, S. Jha, R. Lippman, and J. M. Wing, Automated generation and analysis of attack graphs. S&Pi, 2002.

N. Vavoulas and C. , Xenakis: A Quantitative Risk Analysis Approach for Deliberate Threats, CRITIS, pp.13-25, 2011.