A. Alvi, K. Zulkernine, and M. , A Comparative Study of Software Security Pattern Classifications, 2012 Seventh International Conference on Availability, Reliability and Security, pp.582-589, 2012.
DOI : 10.1109/ARES.2012.43

R. Jhawar, B. Kordy, S. Mauw, S. Radomirovi´cradomirovi´c, and R. Trujillo-rasua, Attack Trees with Sequential Conjunction, IFIP International Information Security Conference, pp.339-353, 2015.
DOI : 10.1007/978-3-319-18467-8_23

URL : https://hal.archives-ouvertes.fr/hal-01197256

B. Kordy, S. Mauw, S. Radomirovi´cradomirovi´c, and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, p.29, 2012.
DOI : 10.1093/logcom/exs029

A. Marback, H. Do, K. He, S. Kondamarri, and D. Xu, A threat model-based approach to security testing, Software: Practice and Experience, vol.3, issue.2, pp.241-258, 2013.
DOI : 10.1109/MSP.2005.55

A. Marback, H. Do, K. He, S. Kondamarri, and D. Xu, Security test generation using threat trees, 2009 ICSE Workshop on Automation of Software Test, pp.62-69, 2009.
DOI : 10.1109/IWAST.2009.5069042

A. Morais, E. Martins, A. Cavalli, and W. Jimenez, Security Protocol Testing Using Attack Trees, 2009 International Conference on Computational Science and Engineering, pp.690-697, 2009.
DOI : 10.1109/CSE.2009.206

L. Regainia and S. Salva, A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation, Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017.
DOI : 10.5220/0006198301360146

M. Schumacher, Security Engineering with Patterns: Origins, Theoretical Models, and New Applications, 2003.
DOI : 10.1007/b11930

N. Shahmehri, A. Mammar, E. Montes-de-oca, D. Byers, A. Cavalli et al., An advanced approach for modeling and detecting software vulnerabilities, Information and Software Technology, vol.54, issue.9, pp.997-1013, 2012.
DOI : 10.1016/j.infsof.2012.03.004

URL : https://hal.archives-ouvertes.fr/hal-00739075

M. Yoshizawa, T. Kobashi, H. Washizaki, Y. Fukazawa, T. Okubo et al., Verifying Implementation of Security Design Patterns Using a Test Template, 2014 Ninth International Conference on Availability, Reliability and Security, pp.178-183, 2014.
DOI : 10.1109/ARES.2014.31

K. Yskout, T. Heyman, R. Scandariato, and W. Joosen, A system of security patterns, 2006.

K. Yskout, R. Scandariato, and W. Joosen, Do Security Patterns Really Help Designers?, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, pp.292-302, 2015.
DOI : 10.1109/ICSE.2015.49