1. Lecture Notes in Computer Science;A. Buldas,2006
2. Lecture Notes in Computer Science;A. Buldas,2007
3. Convery, S., Cook, D., Franz, M.: An attack tree for the Border Gateway Protocol (2004)
4. Downs, D.D., Haddad, R.: Penetration testing—the gold standard for security rating and ranking. In: Proceedings of the 1st Workshop on Information-Security-System Rating and Ranking (WISSRR), Williamsburg, Virginia, USA (2001)
5. Edge, K.S.: A framework for analyzing and mitigating the vulnerabilities of complex systems via attack and protection trees. Ph.D. thesis, Air Force Institute of Technology, Ohio (2007)