M. Colange, S. Baarir, F. Kordon, and Y. Thierry-mieg, Towards Distributed Software Model-Checking Using Decision Diagrams, Computer Aided Verification -25th International Conference, CAV 2013, pp.830-845, 2013.
DOI : 10.1007/978-3-642-39799-8_58

URL : https://hal.archives-ouvertes.fr/hal-01215999

J. B. Hong, D. S. Kim, and T. Takaoka, Scalable Attack Representation Model Using Logic Reduction Techniques, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.404-411, 2013.
DOI : 10.1109/TrustCom.2013.51

B. Kordy, P. Kordy, S. Mauw, and P. Schweitzer, ADTool: Security Analysis with Attack???Defense Trees, Lecture Notes in Computer Science, vol.8054, pp.173-176, 2013.
DOI : 10.1007/978-3-642-40196-1_15

B. Kordy, S. Mauw, S. Radomirovi´cradomirovi´c, and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014.
DOI : 10.1093/logcom/exs029

B. Kordy, L. Pì-etre-cambacédès, and P. Schweitzer, DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, pp.13-14, 2014.
DOI : 10.1016/j.cosrev.2014.07.001

S. Mauw and M. Oostdijk, Foundations of Attack Trees, International Conference on Information Security and Cryptology -ICISC 2005, pp.186-198, 2006.
DOI : 10.1007/11734727_17

S. Pinchinat, M. Acher, D. Vojtisek, . Hofm, . Safome et al., Towards Synthesis of Attack Trees for Supporting Computer-Aided Risk Analysis, Revised Selected Papers. Lecture Notes in Computer Science, vol.8938, pp.363-375, 2014.
DOI : 10.1007/978-3-319-15201-1_24

URL : https://hal.archives-ouvertes.fr/hal-01064645

B. Schneier, Attack Trees, Dr. Dobb's Journal, 1999.
DOI : 10.1002/9781119183631.ch21

S. Paul, Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study, Electronic Proceedings in Theoretical Computer Science, vol.148, pp.31-46, 2014.
DOI : 10.4204/EPTCS.148.3

Y. Thierry-mieg, Symbolic Model-Checking Using ITS-Tools Tools and Algorithms for the Construction and Analysis of Systems, 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, pp.231-237, 2015.

R. Vigo, F. Nielson, and H. R. Nielson, Automated Generation of Attack Trees, 2014 IEEE 27th Computer Security Foundations Symposium, pp.337-350, 2014.
DOI : 10.1109/CSF.2014.31