1. A graph-based system for network-vulnerability analysis;Swiler,1998
2. Automated generation and analysis of attack graphs;Sheyner;IEEE Security and Privacy Magazine,2002
3. Interactive analysis of attack graphs using relational queries;Wang,2006
4. Network vulnerability assessment using Bayesian networks. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005;Liu,2005