1. Lecture Notes in Computer Science;T Gonda,2017
2. Wang, J.K., Moya, C.: Attack path reconstruction from adverse consequences on power grids with a focus on monitoring-layer attacks. In: Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids. IEEE Computer Society, pp. 1–6 (2016)
3. Garg, U., Bansal, S., Prashar, D., et al.: Inter-dependent effect of vulnerabilities for generation of effective attack path score. Int. J. Appl. Eng. Res. 10(8), 21487–21499 (2015)
4. Xin, J.: Defense simulation task deployment method based on attack path automatic generation. Autom. Instrum. (2017)
5. Wang, H., Wang, T., Liu, S.: A network attack path prediction method based on ATI. Comput. Eng. 42(9), 132–137, 143 (2016)