Bluetooth Specification: File Transfer Profile (FTP), 2012. ,
Formal analysis of authentication in bluetooth device pairing In: Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, p.45, 2007. ,
Comprehensive Experimental Analyses of Automotive Attack Surfaces, Proc. of 20th USENIX Security Symp, pp.77-92, 2011. ,
Taming the Blue Beast: A Survey of Bluetooth Based Threats, IEEE Security & Privacy Magazine, vol.8, issue.2, pp.20-27, 2010. ,
DOI : 10.1109/MSP.2010.3
Deliverable D2.3 -Security requirements for automotive on-board networks based on dark-side scenarios, 2009. ,
Identification of Security Requirements in Systems of Systems by Functional Security Analysis, Architect. Dep. Sys. VII, vol.6420, pp.74-96, 2010. ,
DOI : 10.1007/978-3-642-17245-8_4
System Quality Requirements Engineering (SQUARE) Methodology: Case Study on Asset Management System, 2005. ,
A framework towards the efficient identification and modeling of security requirements, Proc. of the 5th Conf. on Network Architecture and Information Systems, pp.1-15, 2010. ,
Elaborating security requirements by construction of intentional anti-models, Proceedings. 26th International Conference on Software Engineering, 2004. ,
DOI : 10.1109/ICSE.2004.1317437
Software Vulnerability Discovery Techniques: A Survey, 2012 Fourth International Conference on Multimedia Information Networking and Security, 2012. ,
DOI : 10.1109/MINES.2012.202
Foundations of Attack Trees, Proc. of the 8th Int. Conf. on Information Security and Cryptology, pp.186-198, 2005. ,
DOI : 10.1109/DISCEX.2001.932182
URL : http://www.win.tue.nl/~sjouke/publications/papers/attacktrees.pdf
Perspectives on Penetration Testing ??? Black Box vs. White Box, Network Security, vol.2002, issue.11, pp.10-12, 2002. ,
DOI : 10.1016/S1353-4858(02)11009-9
Survey of Vehicle IoT Bluetooth Devices, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp.260-264, 2014. ,
DOI : 10.1109/SOCA.2014.20
Experimental comparison of attack trees and misuse cases for security threat identification, Information and Software Technology, vol.51, issue.5, pp.916-932, 2009. ,
DOI : 10.1016/j.infsof.2008.05.013
Understanding Concurrent Systems, 2010. ,
DOI : 10.1007/978-1-84882-258-0
J3061 : Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, 2016. ,
Attack Trees, 1999. ,
DOI : 10.1002/9781119183631.ch21