W. Damm and D. Harel, LSCs: Breathing Life into Message Sequence Charts, Formal Methods in System Design, vol.19, issue.1, pp.45-80, 2001.
DOI : 10.1023/A:1011227529550

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.5472

A. Groll and C. Ruland, Secure and authentic communication on existing in-vehicle networks, 2009 IEEE Intelligent Vehicles Symposium, pp.1093-1097, 2009.
DOI : 10.1109/IVS.2009.5164434

D. Harel, S. Maoz, and I. Segall, Some Results on the Expressive Power and Complexity of LSCs, Lecture Notes in Computer Science, vol.4800, p.351, 2008.
DOI : 10.1007/978-3-540-78127-1_19

M. Hussein and M. Zulkernine, UMLintr: a UML profile for specifying intrusions, 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06), pp.8-288, 2006.
DOI : 10.1109/ECBS.2006.70

J. Jürjens, UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference on The Unified Modeling Language, pp.412-425, 2002.
DOI : 10.1007/3-540-45800-X_32

K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno et al., Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010.
DOI : 10.1109/SP.2010.34

S. Kumar, Classification and Detection of Computer Intrusions, 1995.

U. Lindqvist and P. Porras, Detecting computer and network misuse through the production-based expert system toolset (P-BEST), Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.146-161, 1999.
DOI : 10.1109/SECPRI.1999.766911

T. Lodderstedt, D. Basin, and J. Doser, SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: UML 2002 ? The Unified Modeling Language, pp.426-441, 2002.
DOI : 10.1007/3-540-45800-x_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.6554

F. Massacci and K. Naliuka, Towards Practical Security Monitors of UML Policies for Mobile Applications, Proc. of IEEE POLICY '07, pp.278-278, 2007.

M. Meta-case-papadimitratos, P. Buttyan, and L. , Secure vehicular communication systems: design and architecture, IEEE Communications Magazine, vol.46, issue.11, pp.100-109, 2008.
DOI : 10.1109/MCOM.2008.4689252

L. Patzina, S. Patzina, T. Piper, and A. Schürr, Monitor petri nets for security monitoring?, Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, S&D4RCES '10, 2010.
DOI : 10.1145/1868433.1868438

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.5693

S. Schmerl, Entwurf und Entwicklung einer effizienten Analyseeinheit für Intrusion-Detection-Systeme, 2004.

G. Sindre and A. L. Opdahl, Capturing Security Requirments through Misuse Cases, p.2001, 2001.
DOI : 10.1007/s00766-004-0194-4

M. Sloman and E. Lupu, Security and management policy specification, IEEE Network, vol.16, issue.2, pp.10-19, 2002.
DOI : 10.1109/65.993218

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.8405

B. Solhaug and D. Elgesem, Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.19-28, 2007.
DOI : 10.1109/POLICY.2007.42

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.487.8702

G. Vigna, S. Eckmann, and R. Kemmerer, The STAT tool suite, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.46-55, 2000.
DOI : 10.1109/DISCEX.2000.821508

B. Westphal and T. Toben, The Good, the Bad and the Ugly: Well-Formedness of Live Sequence Charts, In: Fundamental Approaches to Software Engineering, vol.3922, pp.230-246, 2006.
DOI : 10.1007/11693017_18