1. Ammann DWP and Kaushik S (2002) Scalable, graphbased network vulnerability analysis. In: Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002
2. ‘Attack graphs’ predict computer security, http://www.eetimes.com/showArticle.jhtml?articleID=209601075
3. Cuppens F and Miege A (2002) Alert correlation in a cooperative intrusion detection framework. Proceedings 2002 IEEE Symposium on Security and Privacy, page 202, Berkeley, CA, USA, IEEE Comput. Soc.
4. Lee W, Qin X (2003) Statistical causality analysis of infosec alert data. In: Proceedings of the International Symposium on the Recent Advances in Intrusion Detection (RAID 2003), pages 73–94. Springer-Verlag, 2003
5. Ning P, Cui Y, Reeves DS, Xu D (2004) Techniques and tools for analyzing intrusion alerts. ACM Trans Inf Syst Secur 7(2):274