[1]
Zhendong Ma, Christian Wagner, Robert Woitsch, Florian Skopik, and Thomas Bleier, “Model-driven Security: from Theory to Application”, ijcisim, vol. 5, p. 8, Jan. 2013.