J. D. Weis, A system security engineering process, Proceedings of the 14th National. Computer Security Conference, 1991.

B. Schneier, Attack Trees, Dr. Dobb' s Journal, vol.24, issue.12, pp.21-29, 1999.
DOI : 10.1002/9781119183631.ch21

A. P. Moore, R. J. Ellison, and R. C. Linger, Attack modeling for information security and survivability, 2001.

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002.
DOI : 10.1109/SECPRI.2002.1004377

O. Sheyner and J. Wing, Tools for Generating and Anaylzing Attack Graphs, FMCO 2003, pp.344-371, 2004.
DOI : 10.1007/978-3-540-30101-1_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.1605

T. R. Ingoldsby, Fundamentals of Capabilities-based Attack Tree Analysis. Amenaza Technologies Limited, pp.406-917

S. Jha, O. Sheyner, and J. Wing, Two formal analyses of attack graphs, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.49-63, 2002.
DOI : 10.1109/CSFW.2002.1021806

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002.
DOI : 10.1109/SECPRI.2002.1004377

O. M. Sheyner, Scenario graphs and attack graphs, 2004.

S. Mauw and M. Oostdijk, Foundations of Attack Trees, International Conference on Information Security and Cryptology ? ICISC 2005, pp.186-198, 2005.
DOI : 10.1007/11734727_17

B. Kordy, S. Mauw, M. Melissen, and P. Schweitzer, Attack???Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent, Proceedings of the First international conference on Decision and game theory for security, GameSec'10, pp.245-256, 2010.
DOI : 10.1007/978-3-642-17197-0_17

L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, An Attack Graph-Based Probabilistic Security Metric, Proceeedings of the 22Nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp.283-296, 2008.
DOI : 10.1016/j.comcom.2006.06.018

D. Whitley, A genetic algorithm tutorial, Statistics and Computing, vol.4, issue.2, pp.65-85
DOI : 10.1007/BF00175354

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.179

N. Poolsappasit, Towards an Efficient Vulnerability Analysis Methodology for better Security Risk Management, 2010.