S. Ardi, D. Byers, and N. Shahmehri, Towards a structured unified process for software security, Proceedings of the 2006 international workshop on Software engineering for secure systems , SESS '06, pp.3-10, 2006.
DOI : 10.1145/1137627.1137630

F. Arnold, H. Hermanns, R. Pulungan, and M. Stoelinga, Time-Dependent Analysis of Attacks, POST'14, pp.285-305, 2014.
DOI : 10.1007/978-3-642-54792-8_16

D. Byers, S. Ardi, N. Shahmehri, and C. Duma, Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs, 2006 22nd IEEE International Conference on Software Maintenance, pp.411-422, 2006.
DOI : 10.1109/ICSM.2006.40

S. Camtepe and B. Yener, Modeling and detection of complex attacks, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp.234-243, 2007.
DOI : 10.1109/SECCOM.2007.4550338

J. L. Gischer, The equational theory of pomsets, Theoretical Computer Science, vol.61, issue.2-3, pp.199-224, 1988.
DOI : 10.1016/0304-3975(88)90124-7

R. Jhawar, B. Kordy, S. Mauw, S. Radomirovi?, and R. Trujillo-rasua, Attack Trees with Sequential Conjunction, 2015.
DOI : 10.1007/978-3-319-18467-8_23

URL : https://hal.archives-ouvertes.fr/hal-01197256

P. A. Khand, System level security modeling using attack trees, 2009 2nd International Conference on Computer, Control and Communication, pp.1-6, 2009.
DOI : 10.1109/IC4.2009.4909245

B. Kordy, P. Kordy, S. Mauw, and P. Schweitzer, ADTool: Security Analysis with Attack???Defense Trees, QEST'13, pp.173-176, 2013.
DOI : 10.1007/978-3-642-40196-1_15

B. Kordy, S. Mauw, S. Radomirovi?, and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014.
DOI : 10.1093/logcom/exs029

B. Kordy, L. Piètre-cambacédès, and P. Schweitzer, DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, pp.13-14, 2014.
DOI : 10.1016/j.cosrev.2014.07.001

B. Kordy, M. Pouly, and P. Schweitzer, Computational Aspects of Attack???Defense Trees, S&IIS'11, pp.103-116, 2011.
DOI : 10.1007/978-3-540-72665-4_40

B. Kordy, M. Pouly, and P. Schweitzer, A Probabilistic Framework for Security Scenarios with Dependent Actions, iFM'14, 2014.
DOI : 10.1007/978-3-319-10181-1_16

URL : https://hal.archives-ouvertes.fr/hal-01093276

S. Mauw and M. Oostdijk, Foundations of Attack Trees, ICISC'05, pp.186-198, 2006.
DOI : 10.1007/11734727_17

H. Peine, M. Jawurek, and S. Mandel, Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection, 2008 11th IEEE High Assurance Systems Engineering Symposium, pp.9-18, 2008.
DOI : 10.1109/HASE.2008.57

L. Piètre-cambacédès and M. Bouissou, Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP), 2010 European Dependable Computing Conference, pp.199-208, 2010.
DOI : 10.1109/EDCC.2010.32

S. Pinchinat, M. Acher, and D. Vojtisek, Towards Synthesis of Attack Trees for Supporting Computer-Aided Risk Analysis, Software Engineering and Formal Methods, pp.363-375, 2014.
DOI : 10.1007/978-3-319-15201-1_24

URL : https://hal.archives-ouvertes.fr/hal-01064645

X. Qin and W. Lee, Attack plan recognition and prediction using causal networks, 20th Annual Computer Security Applications Conference, pp.370-379, 2004.

A. Roy, D. S. Kim, and K. S. Trivedi, Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Security and Communication Networks, vol.1, issue.1, pp.929-943, 2012.
DOI : 10.1002/sec.299

B. Schneier, Attack Trees, Journal of Software Tools, vol.24, issue.12, pp.21-29, 1999.
DOI : 10.1002/9781119183631.ch21

J. Wang, J. N. Whitley, R. C. Phan, and D. J. Parish, Unified Parametrizable Attack Tree, International Journal for Information Security Research, vol.1, issue.1, pp.20-26, 2011.
DOI : 10.20533/ijisr.2042.4639.2011.0003

L. Wen-ping and L. Wei-min, Space Based Information System Security Risk Evaluation Based on Improved Attack Trees, pp.480-483, 2011.

J. Willemson and A. Jürgenson, Serial Model for Attack Tree Computations, ICISC'09, pp.118-128, 2010.