1. 2020 Internet Crime Report.
2. Shirey, R. (2007). Internet security glossary, version 2.
3. Swiler, L. P., Phillips, C., & Gaylor, T. (1998). A graph-based network-vulnerability analysis system (No. SAND-97-3010/1). Sandia National Labs.
4. Haasl, D. F., Roberts, N. H., Vesely, W. E., & Goldberg, F. F. (1981). Fault tree handbook (No. NUREG-0492). Nuclear Regulatory Commission.
5. Schneier, B. (1999). Attack trees. Dr. Dobb’s Journal, 24(12), 21–29.