P. Ammann, D. Wijesekera, and S. Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.217-224, 2002.
DOI : 10.1145/586110.586140

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.1162

R. Dewri, N. Poolsappasit, I. Ray, and D. Whitley, Optimal security hardening using multiobjective optimization on attack tree models of networks, Proc. of ACM conference on Computer and communications security, pp.204-213, 2007.

S. Gupta and J. Winstead, Using Attack Graphs to Design Systems. Security and Privacy, IEEE, vol.5, issue.4, pp.80-83, 2007.
DOI : 10.1109/msp.2007.100

A. Xie, Z. Cai, C. Tang, J. Hu, and Z. Chen, Evaluating Network Security With Two-Layer Attack Graphs, 2009 Annual Computer Security Applications Conference, 2009.
DOI : 10.1109/ACSAC.2009.22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.538.4676

X. Ou, W. Boyer, and M. Mcqueen, A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.336-345, 2006.
DOI : 10.1145/1180405.1180446

K. Ingols, M. Chu, R. Lippmann, S. Webster, and S. Boyer, Modeling Modern Network Attacks and Countermeasures Using Attack Graphs, 2009 Annual Computer Security Applications Conference, pp.117-126, 2009.
DOI : 10.1109/ACSAC.2009.21

URL : http://cis.ksu.edu/~zhangs84/ReadingList/MIT09ACSAC.pdf

V. Saini, Q. Duan, and V. Paruchuri, Threat modeling using attack trees, J. Comput. Sci. Coll, vol.23, issue.4, pp.124-131, 2008.

J. Dawkins and J. Hale, A systematic approach to multi-stage network attack analysis, Second IEEE International Information Assurance Workshop, 2004. Proceedings., pp.48-56, 2004.
DOI : 10.1109/IWIA.2004.1288037

K. Edge, A Framework for Analyzing and Mitigating the Vulnerabilities of Complex Systems via Attack and Protection Trees, 2007.

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, 2002.
DOI : 10.1109/SECPRI.2002.1004377

K. Ingols, R. Lippmann, and K. Piwowarski, Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.121-130, 2006.
DOI : 10.1109/ACSAC.2006.39

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8029

R. Lippmann and K. Ingols, An Annotated Review of Past Papers on Attack Graphs, 2005.

S. Noel and S. Jajodia, Managing attack graph complexity through visual hierarchical aggregation, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.109-118, 2004.
DOI : 10.1145/1029208.1029225

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.3529

F. Chen, D. Liu, Y. Zhang, and J. Su, A Scalable Approach to Analyzing Network Security using Compact Attack Graphs, Journal of Networks, vol.5, issue.5, 2010.
DOI : 10.4304/jnw.5.5.543-550

URL : http://doi.org/10.4304/jnw.5.5.543-550

B. Schneier, Secrets and Lies: Digital Security in a Networked World, 2000.
DOI : 10.1002/9781119183631

A. Roy, D. Kim, and K. Trivedi, Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Security and Communication Networks, vol.1, issue.1, pp.929-943, 2012.
DOI : 10.1002/sec.299

J. Hong and D. Kim, HARMs: Hierarchical Attack Representation Models for Network Security Analysis, Proc. of the 10th Australian Information Security Management Conference in SECAU Security Congress, 2012.

R. Sawilla and X. Ou, Identifying Critical Attack Assets in Dependency Attack Graphs, Proc. of the 13th European Symposium on Research in Computer Security, pp.18-34, 2008.
DOI : 10.1145/1052934.1052938

URL : http://cis.ksu.edu/~xou/publications/esorics08.pdf

S. Noel and S. Jajodia, Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices, 21st Annual Computer Security Applications Conference (ACSAC'05), p.169, 2005.
DOI : 10.1109/CSAC.2005.58

R. Hewett and P. Kijsanayothin, Host-Centric Model Checking for Network Vulnerability Analysis, 2008 Annual Computer Security Applications Conference (ACSAC), pp.225-234, 2008.
DOI : 10.1109/ACSAC.2008.15

M. Albanese, S. Jajodia, and S. Noel, Time-efficient and cost-effective network hardening using attack graphs, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), 2012.
DOI : 10.1109/DSN.2012.6263942

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.660.2954

K. Pawlikowski, H. Jeong, and J. Lee, On credibility of simulation studies of telecommunication networks, IEEE Communications Magazine, vol.40, issue.1, pp.132-139, 2002.
DOI : 10.1109/35.978060

G. Ewing, K. Pawlikowski, and D. Mcnickle, Akaroa-2: Exploiting network computing by distributing stochastic simulation, Proc. European Simulation Multiconference, pp.175-181, 1999.