A. Zuccato, N. Daniels, and C. Jampathom, Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security, 2011 Sixth International Conference on Availability, Reliability and Security, 2011.
DOI : 10.1109/ARES.2011.81

Y. Rebahi, M. Nassar, T. Magedanz, and O. Festor, A survey on fraud and service misuse in voice over IP (VoIP) networks, Information Security Technical Report, vol.16, issue.1, pp.12-19, 2011.
DOI : 10.1016/j.istr.2010.10.012

A. S. Yesuf, A Review of Risk Identification Approaches in the Telecommunication Domain, The 3rd International Conference on Information Systems Security and Privacy, 2017.

A. S. Yesuf, L. Wolos, and K. Rannenberg, Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services, The 8th International Conference on Exploring Service Science, 2017.
DOI : 10.1007/978-3-319-48393-1_8

A. Abdallah, M. A. Maarof, and A. Zainal, Fraud detection system: A survey, Journal of Network and Computer Applications, vol.68, pp.90-113, 2016.
DOI : 10.1016/j.jnca.2016.04.007

C. S. Hilas and P. A. Mastorocostas, An application of supervised and unsupervised learning approaches to telecommunications fraud detection, Knowledge-Based Systems, vol.21, issue.7, pp.721-726, 2008.
DOI : 10.1016/j.knosys.2008.03.026

I. Ruiz-agundez, Y. K. Penya, and P. G. Bringas, Fraud Detection for Voice over IP Services on Next-Generation Networks, IFIP International Workshop on Information Security Theory and Practices, pp.199-212, 2010.
DOI : 10.1093/ietcom/e90-b.11.3004

URL : https://hal.archives-ouvertes.fr/hal-01056086

H. Farvaresh and M. M. Sepehri, A data mining framework for detecting subscription fraud in telecommunication, Engineering Applications of Artificial Intelligence, vol.24, issue.1, pp.182-194, 2011.
DOI : 10.1016/j.engappai.2010.05.009

D. Ionita, R. J. Wieringa, L. Wolos, J. Gordijn, and W. Pieters, Using Value Models for Business Risk Analysis in e-Service Networks, 2015.
DOI : 10.1007/978-3-319-25897-3_16

URL : https://hal.archives-ouvertes.fr/hal-01442255

D. Ionita, J. Gordijn, A. S. Yesuf, and R. Wieringa, Value-Driven Risk Analysis of Coordination Models, pp.102-116, 2016.
DOI : 10.1007/978-3-540-89652-4_26

J. Yoder and J. Barcalow, Architectural patterns for enabling application security, Urbana, vol.51, p.61801, 1998.

A. Braga, C. Rubira, and R. Dahab, Tropyc: A pattern language for cryptographic software, 1999.

M. Schumacher, E. Fernandez-buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns, Informatik-Spektrum, vol.25, issue.3, 2013.
DOI : 10.1007/s002870200223

´. E. Dubois, P. Heymans, N. Mayer, and R. Matulevi?ius, A Systematic Approach to Define the Domain of Information System Security Risk Management, pp.289-306, 2010.
DOI : 10.1007/978-3-642-12544-7_16

E. Rosas and C. Analide, Telecommunications fraud: Problem analysis-an agentbased kdd perspective, p.2009, 2009.

M. Ghosh, Telecoms fraud, Computer Fraud & Security, vol.2010, issue.7, pp.14-17, 2010.
DOI : 10.1016/S1361-3723(10)70082-8

A. Rrenja and R. Matulevi?ius, Pattern-Based Security Requirements Derivation from Secure Tropos Models, pp.59-74, 2015.
DOI : 10.1007/978-3-319-25897-3_5

URL : https://hal.archives-ouvertes.fr/hal-01442266