1. Lallie HS, Debattista K, Bal J (2020) A review of attack graph and attack tree visual syntax in cyber security. Comput Sci Rev 35:100219. https://doi.org/10.1016/j.cosrev.2019.100219
2. “Computer Network Defense”, Web.archive.org, 2011. [Online]. Available: https://web.archive.org/web/20160425120250/, https://www.sypriselectronics.com/information-security/cyber-security-solutions/computer-network-defense/. Accessed 20 Mar 2022
3. Johnson R (2015) How your red team penetration testers can help improve your blue team. SC Magazine UK, 2015. [Online]. Available: https://web.archive.org/web/20160530230034/, http://www.scmagazineuk.com/how-your-red-team-penetration-testers-can-help-improve-your-blue-team/article/431023/. Accessed 20 Mar 2022
4. Faircloth J (2017) Chapter 2—Reconnaissance. In: Faircloth J (ed) Penetration tester’s open source toolkit (Fourth Edition), 4th edn. Syngress, Boston, pp 31–106
5. Schneier B (1999) Attack trees: modeling security threats. Dr. Dobbs J