A. Bagnato, B. Kordy, P. H. Meland, and P. Schweitzer, Attribute Decoration of Attack???Defense Trees, International Journal of Secure Software Engineering, vol.3, issue.2, pp.1-35, 2012.
DOI : 10.4018/jsse.2012040101

URL : http://satoss.uni.lu/members/barbara/papers/IJSSE12.pdf

E. J. Byres, M. Franz, and D. Miller, The use of attack trees in assessing vulnerabilities in SCADA systems, Proc. of the Int. Infrastructure Survivability Workshop, 2004.

S. Du and H. Zhu, Security Assessment via Attack Tree Model, Security Assessment in Vehicular Networks, pp.9-16, 2013.
DOI : 10.1007/978-1-4614-9357-0_2

K. Edge, R. Raines, M. Grimaila, R. Baldwin, R. Bennington et al., The Use of Attack and Protection Trees to Analyze Security for an Online Banking System, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
DOI : 10.1109/HICSS.2007.558

O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw et al., Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0, Proc. of QEST, 2016.
DOI : 10.1007/11856214_7

D. L. Kewley and J. F. Bouchard, DARPA Information Assurance Program dynamic defense experiment summary, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol.31, issue.4, pp.331-336, 2001.
DOI : 10.1109/3468.935052

B. Kordy, S. Mauw, S. Radomirovi´cradomirovi´c, and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, vol.24, issue.1, pp.55-87, 2014.
DOI : 10.1093/logcom/exs029

B. Kordy, L. Pì-etre-cambacédès, and P. Schweitzer, DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, 2014.
DOI : 10.1016/j.cosrev.2014.07.001

URL : http://arxiv.org/pdf/1303.7397.pdf

R. Kumar, E. Ruijters, and M. I. Stoelinga, Quantitative Attack Tree Analysis via Priced Timed Automata, FORMATS, pp.156-171
DOI : 10.1007/978-3-319-22975-1_11

T. Li, J. Horkoff, E. Paja, K. Beckers, and J. Mylopoulos, Analyzing Attack Strategies Through Anti-goal Refinement, Proc. of PoEM, pp.75-90, 2015.
DOI : 10.1007/978-3-319-25897-3_6

URL : https://hal.archives-ouvertes.fr/hal-01442299

S. Mauw and M. Oostdijk, Foundations of Attack Trees, Proc. of ICISC'05, pp.186-198, 2006.
DOI : 10.1109/DISCEX.2001.932182

URL : http://www.win.tue.nl/~sjouke/publications/papers/attacktrees.pdf

A. Morais, I. Hwang, A. Cavalli, and E. Martins, Generating attack scenarios for the system security validation, Networking Science, vol.24, issue.12, pp.3-469, 2013.
DOI : 10.1109/TIT.1983.1056650

URL : https://hal.archives-ouvertes.fr/hal-00848049

A. Opdahl and G. Sindre, Experimental comparison of attack trees and misuse cases for security threat identification, Information and Software Technology, vol.51, issue.5, pp.916-932, 2009.
DOI : 10.1016/j.infsof.2008.05.013

S. Paul, Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study, Proc. of GraMSec, pp.31-46, 2014.
DOI : 10.1109/JSYST.2012.2221933

I. Ray and N. Poolsapassit, Using Attack Trees to Identify Malicious Attacks from Authorized Insiders, Proc. of ESORICS, pp.231-246, 2005.
DOI : 10.1007/11555827_14

A. Roy, D. S. Kim, and K. S. Trivedi, Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Security and Communication Networks, vol.1, issue.1, pp.929-943, 2012.
DOI : 10.1002/sec.299

V. Saini, Q. Duan, and V. Paruchuri, Threat modeling using attack trees, J. of Computing Sciences in Colleges, vol.23, issue.4, pp.124-131, 2008.

B. Schneier, Attack Trees. Dr. Dobb's Journal of Software Tools, pp.21-29, 1999.