[1]
T. Peng, S. Wang, J. Geng, Q. Wang, Y. Yang, and K. Zhang, “Verification of the Instantiation and Integration of Security Patterns”, JWE, vol. 19, no. 3-4, pp. 521–556, Aug. 2020.