P. Ammann, D. Wijesekera, and S. Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp.217-224, 2002.

M. Audinot, S. Pinchinat, and B. Kordy, Guided design of attack trees: a systembased approach, 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp.61-75, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01871059

M. S. Boddy, J. Gohde, T. Haigh, and S. A. Harp, Course of action generation for cyber security using classical planning, ICAPS, pp.12-21, 2005.

C. Cao, L. P. Yuan, A. Singhal, P. Liu, X. Sun et al., Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs, IFIP Annual Conference on Data and Applications Security and Privacy, pp.330-348, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01954421

S. Edelkamp and T. Mehler, Knowledge acquisition and knowledge engineering in the modplan workbench, Proceedings of the First International Competition on Knowledge Engineering for AI, pp.26-33, 2005.

A. Esuli and F. Sebastiani, Sentiwordnet: A publicly available lexical resource for opinion mining, In: LREC, vol.6, pp.417-422, 2006.

N. Ghosh and S. K. Ghosh, A planner-based approach to generate and analyze minimal attack graph, Applied Intelligence, vol.36, issue.2, pp.369-390, 2012.

J. Hoffmann, The metric-ff planning system: Translating"ignoring delete lists"to numeric state variables, Journal of Artificial Intelligence Research, vol.20, pp.291-341, 2003.

R. Howey, D. Long, and M. Fox, Val: Automatic plan validation, continuous effects and mixed initiative planning using pddl, Tools with Artificial Intelligence, 2004. ICTAI 2004. 16th IEEE International Conference on, pp.294-301, 2004.

R. Jhawar, B. Kordy, S. Mauw, S. Radomirovi?, and R. Trujillo-rasua, Attack trees with sequential conjunction, IFIP International Information Security and Privacy Conference, pp.339-353, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01197256

D. Klein and C. D. Manning, Accurate unlexicalized parsing, Proceedings of the 41st Annual Meeting on Association for Computational Linguistics, vol.1, pp.423-430, 2003.

R. P. Lippmann, K. W. Ingols, . Massachusetts-inst-of, . Tech, and . Lincoln-lab, An annotated review of past papers on attack graphs, 2005.

X. Ou, W. F. Boyer, and M. A. Mcqueen, A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security, pp.336-345, 2006.

T. J. Parr and R. W. Quong, Antlr: A predicated-ll (k) parser generator, Software: Practice and Experience, vol.25, issue.7, pp.789-810, 1995.

T. Plch, M. Chomut, C. Brom, and R. Barták, Inspect, edit and debug pddl documents: Simply and efficiently with pddl studio, System Demonstrations and Exhibits at ICAPS pp, pp.15-18, 2012.

N. Poolsappasit, R. Dewri, and I. Ray, Dynamic security risk management using bayesian attack graphs, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.1, pp.61-74, 2012.

I. Ray and N. Poolsapassit, Using attack trees to identify malicious attacks from authorized insiders, ESORICS, vol.3679, pp.231-246, 2005.

M. Roberts, A. E. Howe, I. Ray, and M. Urbanska, Using planning for a personalized security agent, Workshop on Problem Solving using Classical Planners at 26th AAAI Conf. on Artificial Intelligence, 2012.

R. E. Sawilla and X. Ou, Identifying critical attack assets in dependency attack graphs, European Symposium on Research in Computer Security, pp.18-34, 2008.

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002.

A. Singhal and X. Ou, Security risk analysis of enterprise networks using probabilistic attack graphs, Network Security Metrics, pp.53-73, 2017.

X. Sun, J. Dai, P. Liu, A. Singhal, and J. Yen, Using bayesian networks for probabilistic identification of zero-day attack paths, IEEE Transactions on Information Forensics and Security, vol.13, issue.10, pp.2506-2521, 2018.

K. Toutanova and C. D. Manning, Enriching the knowledge sources used in a maximum entropy part-of-speech tagger, Proceedings of the 2000 Joint SIGDAT conference on Empirical methods in natural language processing and very large corpora: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics, vol.13, pp.63-70, 2000.

T. S. Vaquero, V. Romero, F. Tonidandel, and J. R. Silva, itsimple 2.0: An integrated tool for designing planning domains, ICAPS, pp.336-343, 2007.

T. S. Vaquero, J. R. Silva, and J. C. Beck, A brief review of tools and methods for knowledge engineering for planning & scheduling, KEPS, p.7, 2011.

T. S. Vaquero, F. Tonidandel, and J. R. Silva, The itsimple tool for modeling planning domains, Proceedings of the First International Competition on Knowledge Engineering for AI Planning, 2005.

T. Vaquero, R. Tonaco, G. Costa, F. Tonidandel, J. R. Silva et al., it-simple4. 0: Enhancing the modeling experience of planning problems, System Demonstration-Proceedings of the 22nd International Conference on Automated Planning & Scheduling (ICAPS-12), pp.11-14, 2012.

L. Wang, A. Singhal, and S. Jajodia, Measuring the overall security of network configurations using attack graphs, IFIP Annual Conference on Data and Applications Security and Privacy, pp.98-112, 2007.

S. Weerawardhana, S. Mukherjee, I. Ray, and A. Howe, Automated extraction of vulnerability information for home computer security, International Symposium on Foundations and Practice of Security, pp.356-366, 2014.