1. Al-Mohannadi, H., Mirza, Q., Namanya, A., Awan, I., Cullen, A., Disso, J.: Cyber-attack modeling analysis techniques: An overview. In: 2016 IEEE 4th international conference on future internet of things and cloud workshops (FiCloudW), pp. 69–76. IEEE, 2016
2. Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf Sci 305, 357–383 (2015)
3. Azure. Github - azure/stormspotter: Azure red team tool for graphing azure and azure active directory objects. https://github.com/Azure/Stormspotter, 2020. Accessed: 14-10-2022
4. Bechberger, D., Perryman, J.: Graph Databases in Action. Manning Publications, New York (2020)
5. Besta, M., Peter, E., Gerstenberger, R., Fischer, M., Podstawski, M., Barthels, C., Alonso, G., Hoefler, T.: Demystifying graph databases: Analysis and taxonomy of data organization, system designs, and graph queries. arXiv preprint arXiv:1910.09017, 2019