Using Attack Graphs to Design Systems, IEEE Security & Privacy Magazine, vol.5, issue.4, 2007. ,
DOI : 10.1109/MSP.2007.100
Defining Misuse within the Development Process, IEEE Security and Privacy Magazine, vol.4, issue.6, pp.81-84, 2006. ,
DOI : 10.1109/MSP.2006.149
Cost-Effective Security, IEEE Security & Privacy Magazine, vol.5, issue.3, pp.85-87, 2007. ,
DOI : 10.1109/MSP.2007.56
Fuzzy Engineering, 1997. ,
Fuzzy cognitive maps, International Journal of Man-Machine Studies, vol.24, issue.1, pp.65-75, 1986. ,
DOI : 10.1016/S0020-7373(86)80040-2
? Survey about Fuzzy Cognitive Maps Papers, International Journal of Computational Cognition, vol.3, issue.2, pp.27-33, 2005. ,
Genetic Algorithms in Search, Optimisation and Machine Learning, 1989. ,
Computer-attack graph generation tool, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, pp.307-321, 2001. ,
DOI : 10.1109/DISCEX.2001.932182