R. Alur and D. L. Dill, Automata for modeling real-time systems, Lecture Notes in Computer Science, vol.443, pp.322-335, 1990.
DOI : 10.1007/BFb0032042

F. Arnold, D. Guck, R. Kumar, and M. Stoelinga, Sequential and Parallel Attack Tree Modelling, Computer Safety, Reliability, and Security, pp.291-299, 2015.
DOI : 10.1007/978-3-319-24249-1_25

Z. Aslanyan and F. Nielson, Pareto Efficient Solutions of Attack-Defence Trees, Principles of Security and Trust
DOI : 10.1007/978-3-662-46666-7_6

A. Bagnato, B. Kordy, P. H. Meland, and P. Schweitzer, Attribute Decoration of Attack???Defense Trees, International Journal of Secure Software Engineering, vol.3, issue.2, p.2012
DOI : 10.4018/jsse.2012040101

G. Behrmann, A. David, and K. G. Larsen, A Tutorial on Uppaal, Lecture Notes in Computer Science, vol.3185, pp.200-236, 2004.
DOI : 10.1007/978-3-540-30080-9_7

A. Buldas, P. Laud, J. Priisalu, M. Saarepera, and J. Willemson, Rational Choice of Security Measures Via Multi-parameter Attack Trees, Critical Information Infrastructures Security, pp.235-248, 2006.
DOI : 10.1007/11962977_19

G. C. Dalton, R. F. Mills, J. M. Colombi, and R. A. Raines, Analyzing Attack Trees using Generalized Stochastic Petri Nets, 2006 IEEE Information Assurance Workshop, pp.116-123, 2006.
DOI : 10.1109/IAW.2006.1652085

A. David, K. G. Larsen, A. Legay, M. Miku?ionis, D. B. Poulsen et al., Statistical Model Checking for Networks of Priced Timed Automata, FORMATS, pp.80-96, 2011.
DOI : 10.1145/1755952.1755987

A. David, P. G. Jensen, K. G. Larsen, A. Legay, D. Lime et al., On Time with Minimal Expected Cost!, Automated Technology for Verification and Analysis, pp.129-145, 2014.
DOI : 10.1007/978-3-319-11936-6_10

A. David, P. G. Jensen, K. G. Larsen, M. Mikucionis, and J. H. Taankvist, Uppaal Stratego, Lecture Notes in Computer Science, vol.9035, pp.206-211, 2015.
DOI : 10.1007/978-3-662-46681-0_16

O. Gadyatskaya, How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems, Proc. of GraMSec, 2015.
DOI : 10.1007/978-3-319-29968-6_4

URL : http://arxiv.org/abs/1509.00643

H. Hermanns, J. Krämer, J. Kr?ál, and M. Stoelinga, The value of attackdefence diagrams, Principles of Security and Trust, pp.163-185, 2016.

M. G. Ivanova, C. W. Probst, R. R. Hansen, and F. Kammuller, Transforming Graphical System Models to Graphical Attack Models, Proc. of GraMSec, 2015.
DOI : 10.1007/978-3-319-29968-6_6

URL : http://doc.utwente.nl/97647/7/chp_10.1007_978-3-319-29968-6_6.pdf

A. Jürgenson and J. Willemson, Computing exact outcomes of multiparameter attack trees, On the Move to Meaningful Internet Systems: OTM 2008, pp.1036-1051, 2008.

B. Kordy, S. Mauw, S. Radomirovi´cradomirovi´c, and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014.
DOI : 10.1093/logcom/exs029

URL : http://logcom.oxfordjournals.org/cgi/content/short/exs029v1

B. Kordy, L. Pì-etre-cambacédès, and P. Schweitzer, DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, pp.13-141, 2014.
DOI : 10.1016/j.cosrev.2014.07.001

R. Kumar, E. Ruijters, and M. Stoelinga, Quantitative Attack Tree Analysis via Priced Timed Automata, Formal Modeling and Analysis of Timed Systems, pp.156-171, 2015.
DOI : 10.1007/978-3-319-22975-1_11

URL : http://doc.utwente.nl/97025/1/chp_10.1007_978-3-319-22975-1_11%281%29.pdf

K. G. Larsen, P. Pettersson, and W. Yi, Uppaal in a nutshell, International Journal on Software Tools for Technology Transfer, vol.1, issue.1-2, pp.134-15210, 1997.
DOI : 10.1007/s100090050010

S. Mauw and M. Oostdijk, Foundations of Attack Trees, Proceedings of the International Conference on Information Security and Cryptology (ICISC 2005), pp.186-198, 2005.
DOI : 10.1007/11734727_17

F. Nielson, Z. Aslanyan, and D. Parker, Quantitative verification and synthesis of attack-defense scenarios

C. Salter, O. S. Saydjari, B. Schneier, and J. Wallner, Toward a secure system engineering methodology, Proceedings of the 1998 New Security Paradigms Workshop (NSPW'98), pp.2-10, 1998.
DOI : 10.1145/310889.310900

B. Schneier, Attack Trees, 1999.
DOI : 10.1002/9781119183631.ch21