P. Ammann, D. Wijesekera, and S. Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.217-224, 2002.
DOI : 10.1145/586110.586140

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.1162

T. Cormen, C. Leiserson, R. Rivest, and C. Stein, Introduction to Algorithms, 2009.

J. Homer, A. Varikuti, X. Ou, and M. Mcqueen, Improving Attack Graph Visualization through Data Reduction and Attack Grouping, Proceedings of the Fifth International Workshop on Visualization for Cyber Security, pp.68-79, 2008.
DOI : 10.1007/978-3-540-85933-8_7

URL : http://cis.ksu.edu/~xou/publications/vizsec08.pdf

K. Ingols, R. Lippmann, and K. Piwowarski, Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.121-130, 2006.
DOI : 10.1109/ACSAC.2006.39

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8029

S. Jha, O. Sheyner, and J. Wing, Two formal analyses of attack graphs, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, p.49, 2002.
DOI : 10.1109/CSFW.2002.1021806

C. Liu, A. Singhal, and D. Wijesekera, Mapping evidence graphs to attack graphs, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.121-126, 2012.
DOI : 10.1109/WIFS.2012.6412636

V. Mehta, C. Bartzis, H. Zhu, E. Clarke, and J. Wing, Ranking Attack Graphs, Proceedings of the Ninth International Conference on Recent Advances in Intrusion Detection, pp.127-144, 2006.
DOI : 10.1007/11856214_7

X. Ou, W. Boyer, and M. Mcqueen, A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.336-345, 2006.
DOI : 10.1145/1180405.1180446

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.468.1616

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002.
DOI : 10.1109/SECPRI.2002.1004377

A. Singhal and X. Ou, Security Risk Analysis of Enterprise Networks using Probabilistic Attack Graphs, NIST Interagency Report National Institute of Standards and Technology, vol.7788, 2011.
DOI : 10.6028/NIST.IR.7788

L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, An Attack Graph-Based Probabilistic Security Metric, Proceedings of the Twenty-Second Annual IFIP WG 11.3 Conference on Data and Applications Security, pp.283-296, 2008.
DOI : 10.1016/j.comcom.2006.06.018

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.465.9269

W. Wang and T. Daniels, A Graph Based Approach Toward Network Forensics Analysis, ACM Transactions on Information and System Security, vol.12, issue.1, 2008.
DOI : 10.1145/1410234.1410238