R. Alur and D. L. Dill, Automata for modeling real-time systems, Lecture Notes in Computer Science, vol.443, pp.322-335, 1990.
DOI : 10.1007/BFb0032042

Z. Aslanyan and F. Nielson, Pareto Efficient Solutions of Attack-Defence Trees, Principles of Security and Trust, pp.9510-1007, 2015.
DOI : 10.1007/978-3-662-46666-7_6

URL : http://orbit.dtu.dk/en/publications/pareto-efficient-solutions-of-attackdefence-trees(351165da-3d91-4ea8-9131-7aa0962b34ba).html

Z. Aslanyan, F. Nielson, and D. Parker, Quantitative Verification and Synthesis of Attack-Defence Scenarios, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.105-119, 2016.
DOI : 10.1109/CSF.2016.15

URL : http://orbit.dtu.dk/files/127221557/2016_QuantitativeVerificationAndSynthesisOfAttackDefenceScenarios.pdf

A. Bagnato, B. Kordy, P. Per-håkon-meland, and . Schweitzer, Attribute Decoration of Attack???Defense Trees, International Journal of Secure Software Engineering, vol.3, issue.2, p.2012
DOI : 10.4018/jsse.2012040101

URL : http://satoss.uni.lu/members/barbara/papers/IJSSE12.pdf

E. Peter, A. Bulychev, K. G. David, M. Larsen, D. B. Mikucionis et al., UPPAAL- SMC: statistical model checking for priced timed automata, Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2012, pp.31-32, 2012.

A. David, K. G. Larsen, A. Legay, U. Nyman, and A. Wasowski, Timed I/O automata, Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, HSCC '10, pp.91-100, 2010.
DOI : 10.1145/1755952.1755967

A. David, K. G. Larsen, A. Legay, M. Miku?ionis, D. B. Poulsen et al., Statistical Model Checking for Networks of Priced Timed Automata, FORMATS, pp.80-96, 2011.
DOI : 10.1145/1755952.1755987

O. Gadyatskaya, R. Rydhof-hansen, K. G. Larsen, A. Legay, M. Chr et al., Modelling attackdefense trees using timed automata, Formal Modeling and Analysis of Timed Systems -14th International Conference, FORMATS 2016 Proceedings, volume 9884 of Lecture Notes in Computer Science, pp.35-50, 2016.
DOI : 10.1007/978-3-319-44878-7_3

URL : https://hal.archives-ouvertes.fr/hal-01406706

H. Hermanns, J. K. Kr?ál, and M. Stoelinga, The Value of Attack-Defence Diagrams, Principles of Security and Trust, pp.163-185, 2016.
DOI : 10.1109/TPDS.2013.211

B. Kordy, S. Mauw, S. Radomirovi?, and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014.
DOI : 10.1093/logcom/exs029

B. Kordy, L. Piètre-cambacédès, and P. Schweitzer, DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, pp.13-141, 2014.
DOI : 10.1016/j.cosrev.2014.07.001

S. Mauw and M. Oostdijk, Foundations of Attack Trees, Proceedings of the International Conference on Information Security and Cryptology (ICISC 2005), pp.186-198, 2005.
DOI : 10.1109/DISCEX.2001.932182

URL : http://www.win.tue.nl/~sjouke/publications/papers/attacktrees.pdf

C. Douglas and . Montgomery, Design and Analysis of Experiments, 2006.

B. Schneier, Attack Trees, Dr. Dobb's Journal, 1999.
DOI : 10.1002/9781119183631.ch21