A system security engineering process, Proceedings of the 14th National. Computer Security Conference, 1991. ,
Attack Trees, Dr. Dobb' s Journal, vol.24, issue.12, pp.21-29, 1999. ,
DOI : 10.1002/9781119183631.ch21
Attack modeling for information security and survivability, 2001. ,
Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002. ,
DOI : 10.1109/SECPRI.2002.1004377
Tools for Generating and Anaylzing Attack Graphs, FMCO 2003, pp.344-371, 2004. ,
DOI : 10.1007/978-3-540-30101-1_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.1605
Fundamentals of Capabilities-based Attack Tree Analysis. Amenaza Technologies Limited, pp.406-917 ,
Two formal analyses of attack graphs, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.49-63, 2002. ,
DOI : 10.1109/CSFW.2002.1021806
Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002. ,
DOI : 10.1109/SECPRI.2002.1004377
Scenario graphs and attack graphs, 2004. ,
Foundations of Attack Trees, International Conference on Information Security and Cryptology ? ICISC 2005, pp.186-198, 2005. ,
DOI : 10.1007/11734727_17
Attack???Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent, Proceedings of the First international conference on Decision and game theory for security, GameSec'10, pp.245-256, 2010. ,
DOI : 10.1007/978-3-642-17197-0_17
An Attack Graph-Based Probabilistic Security Metric, Proceeedings of the 22Nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp.283-296, 2008. ,
DOI : 10.1016/j.comcom.2006.06.018
A genetic algorithm tutorial, Statistics and Computing, vol.4, issue.2, pp.65-85 ,
DOI : 10.1007/BF00175354
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.179
Towards an Efficient Vulnerability Analysis Methodology for better Security Risk Management, 2010. ,