1. S. Gupta and J. Winstead, Using Attack Graphs to Design Systems, IEEE Security & Privacy Magazine, vol.5, issue.4, 2007.
DOI : 10.1109/MSP.2007.100

G. Peterson and J. Steven, Defining Misuse within the Development Process, IEEE Security and Privacy Magazine, vol.4, issue.6, pp.81-84, 2006.
DOI : 10.1109/MSP.2006.149

J. Peeters and . P. Dyson, Cost-Effective Security, IEEE Security & Privacy Magazine, vol.5, issue.3, pp.85-87, 2007.
DOI : 10.1109/MSP.2007.56

. B. Kosko, Fuzzy Engineering, 1997.

. B. Kosko, Fuzzy cognitive maps, International Journal of Man-Machine Studies, vol.24, issue.1, pp.65-75, 1986.
DOI : 10.1016/S0020-7373(86)80040-2

. J. Aguilar, ? Survey about Fuzzy Cognitive Maps Papers, International Journal of Computational Cognition, vol.3, issue.2, pp.27-33, 2005.

D. Goldberg, Genetic Algorithms in Search, Optimisation and Machine Learning, 1989.

L. P. Swiler, C. Phillips, D. Ellis, and . S. Chakerian, Computer-attack graph generation tool, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, pp.307-321, 2001.
DOI : 10.1109/DISCEX.2001.932182