C. J. Alberts, S. G. Behrens, R. D. Pethia, and W. R. Wilson, Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, version 1, 1999.

?. Apiecionek, M. Romantowski, J. Sliwa, B. Jasiul, and R. Goniacz, Safe exchange of information for civil-military operations, Military Communications and Information Technology: A Comprehensive Approach Enabler, pp.39-50, 2010.

D. Barber, Bayesian Reasoning and Machine Learning, 2013.
DOI : 10.1017/CBO9780511804779

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.232.8159

E. Bursztein and J. Mitchell, Using Strategy Objectives for Network Security Analysis, 5th China International Conference on Information Security and Cryptology (Inscrypt), 2009.
DOI : 10.1007/978-3-642-16342-5_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.9746

A. Darwiche, Modeling and reasoning with Bayesian networks, Cambridge Univ, 2009.
DOI : 10.1017/CBO9780511811357

A. Domingo and H. Wietgrefe, A NNEC-compliant approach for a Future Mission Network, MILCOM 2012, 2012 IEEE Military Communications Conference, 2012.
DOI : 10.1109/MILCOM.2012.6415626

V. C. Hu, D. Ferraiolo, R. Kuhn, A. R. Friedman, A. J. Lang et al., Guide to Attribute Based Access Control Definition and Considerations (Draft) NIST Special Publication, pp.800-162, 2013.
DOI : 10.6028/nist.sp.800-162

K. Ingols, R. Lippmann, and K. Piwowarski, Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.121-130, 2006.
DOI : 10.1109/ACSAC.2006.39

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8029

U. Kjaerulff and A. Madsen, Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis, 2008.
DOI : 10.1007/978-1-4614-5104-4

P. Lagadec, L. Dandurand, E. Bouillon, K. Wrona, and S. Torrente, Cyber Defence Situational Awareness and Dynamic Risk Assessment, NATO Research and Technology Organisation Symposium on Information Assurance and Cyber Defence, 2010.

S. Lauritzen and D. J. Spiegelhalter, Local computations with probabilities on graphical structures and their application to expert systems, Journal of the Royal Statistical Society series B, vol.50, pp.157-224, 1988.

P. Matousek, J. Ráb, O. Rysavy, and M. Svéda, A Formal Model for Network-Wide Security Analysis, Proceedings of the 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp.171-181, 2008.

R. Mcgraw, Risk-adaptable access control (radac) In: NIST Privilege (Access, 2009.

A. Ministerio-de and . Públicas, MAGERIT ? version 2, Methodology for Information Systems Risk Analysis and Management, Book I ? The Method, 2006.

G. J. Nalepa and A. Lig?-eza, Designing Reliable Web Security Systems Using Rule-Based Systems Approach, Advances in Web Intelligence . AWIC Conference 2003, LNAI, pp.124-133, 2003.
DOI : 10.1007/3-540-44831-4_14

G. J. Nalepa, A. Lig?-eza, and K. Kaczor, FORMALIZATION AND MODELING OF RULES USING THE XTT2 METHOD, International Journal on Artificial Intelligence Tools, vol.20, issue.06, pp.1107-1125, 2011.
DOI : 10.1002/widm.11

X. Ou, S. Govindavajhala, and A. Appel, MulVAL: A logic-based network security analyzer, Proc. of 14th USENIX Security Symposium, 2005.

B. Schneier, Attack Trees, In: Dr. Dobbs' Journal, 1999.
DOI : 10.1002/9781119183631.ch21

J. Sliwa, K. Gleba, W. Chmiel, P. Szwed, and A. Glowacz, IOEM - Ontology Engineering Methodology for Large Systems, Computational Collective Intelligence: Technologies And Applications: ICCCI 2011 Conf, pp.602-611, 2011.
DOI : 10.1007/978-3-642-23935-9_59

M. Szpyrka, Analysis of VME-Bus communication protocol - RTCP-net approach, Real-Time Systems, vol.31, issue.2, pp.91-108, 2007.
DOI : 10.1007/s11241-006-9003-0

M. Szpyrka, Design and analysis of rule-based systems with Adder Designer Knowledge-Driven Computing: knowledge engineering and intelligent computations, Studies in Computational Intelligence, vol.102, pp.255-271, 2008.

M. Szpyrka, Exclusion rule-based systems—case study, 2008 International Multiconference on Computer Science and Information Technology, pp.237-242, 2008.
DOI : 10.1109/IMCSIT.2008.4747245

M. Szpyrka and T. Szmuc, Decision Tables in Petri Net Models, Rough Sets and Intelligent Systems Paradigms, LNAI, pp.648-657, 2007.
DOI : 10.1007/978-3-540-73451-2_68

K. Wrona and G. Hallingstad, Real-time automated risk assessment in protected core networking, Telecommunication Systems, vol.42, issue.2???3, pp.205-214, 2010.
DOI : 10.1007/s11235-009-9242-1

K. Wrona and G. Hallingstad, Controlled information sharing in NATO operations, 2011, MILCOM 2011 Military Communications Conference, pp.1285-1290, 2011.
DOI : 10.1109/MILCOM.2011.6127479