K. S. Edge, . C. Ii-g, R. A. Raines, and R. A. Mills, Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security, MILCOM 2006, pp.953-959, 2006.
DOI : 10.1109/MILCOM.2006.302512

B. Marthi, S. Russell, and J. Wolfe, Angelic Semantics for High-Level Actions. Rapport technique, EECS Departement, 2007.

S. Mauw and M. Oostdijk, Foundations of Attack Trees, International conference on information security and cryptology -icisc 2005. lncs 3935, pp.186-198, 2005.
DOI : 10.1007/11734727_17

V. Mehta, C. Bartzis, H. Zhu, E. Clarke, and J. Wing, Ranking Attack Graphs, Proceedings of recent advances in intrusion detection, 2006.
DOI : 10.1007/11856214_7

O. Sheyner, J. Haines, S. Jha, R. Lippman, and J. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, p.273, 2002.
DOI : 10.1109/SECPRI.2002.1004377

O. M. Sheyner, Scenario Graphs and Attack Graphs, Thèse de doctorat non publiée, 2004.