M. Colange, S. Baarir, F. Kordon, and Y. Thierry-mieg, Towards Distributed Software Model-Checking Using Decision Diagrams, Lecture Notes in Computer Science, vol.8044, pp.830-845, 2013.
DOI : 10.1007/978-3-642-39799-8_58

URL : https://hal.archives-ouvertes.fr/hal-01215999

J. B. Hong, D. S. Kim, and T. Takaoka, Scalable Attack Representation Model Using Logic Reduction Techniques, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.404-411, 2013.
DOI : 10.1109/TrustCom.2013.51

G. Iso and S. , Norm ISO/IEC 27002 -Information Technology -Security Techniques -Code of Practice for Information Security Management, IEC 27002:2005 edition, 2005.

S. Jha, O. Sheyner, and J. Wing, Two formal analyses of attack graphs, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.49-63, 2002.
DOI : 10.1109/CSFW.2002.1021806

B. Kordy, S. Mauw, S. Radomirovi?, and P. Schweitzer, Foundations of Attack???Defense Trees, Formal Aspects of Security and Trust, pp.80-95, 2011.
DOI : 10.1007/978-3-540-88873-4_8

B. Kordy, S. Mauw, S. Radomirovi?, and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014.
DOI : 10.1093/logcom/exs029

B. Kordy, L. Piètre-cambacédès, and P. Schweitzer, DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, 2013.
DOI : 10.1016/j.cosrev.2014.07.001

S. Mauw and M. Oostdijk, Foundations of Attack Trees, International Conference on Information Security and Cryptology -ICISC 2005, pp.186-198, 2005.
DOI : 10.1007/11734727_17

V. Mehta, C. Bartzis, H. Zhu, E. Clarke, and J. Wing, Ranking Attack Graphs, Proceedings of Recent Advances in Intrusion Detection, 2006.
DOI : 10.1007/11856214_7

N. Research and T. O. , RTO) Improving Common Security Risk Analysis, 2008.

B. Schneier, Attack Trees, Dr. Dobb's Journal, 1999.
DOI : 10.1002/9781119183631.ch21

E. E. Schultz, Risks due to convergence of physical security systems and information technology environments, Information Security Technical Report, vol.12, issue.2, pp.80-84, 2007.
DOI : 10.1016/j.istr.2007.06.001

. Seamonster, http://sourceforge.net/apps/mediawiki/seamonster

O. Sheyner, J. Haines, S. Jha, R. Lippman, and J. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, p.273, 2002.
DOI : 10.1109/SECPRI.2002.1004377

O. Sheyner and J. Wing, Tools for Generating and Analyzing Attack Graphs, Proceedings of Formal Methods for Components and Objects, pp.344-371, 2004.
DOI : 10.1109/32.815323

O. M. Sheyner, Scenario Graphs and Attack Graphs, 2004.