1. [1] John Steven, Gunnar Peterson: Using Attack Graphs to Design Systems, IEEE Computer Societym IEEE SECURITY & PRIVACY, 2007.
2. [2] Jeannette Wing: Scenario Graphs Applied to Network Security, Carnegie Mellon University, 2008.
3. [3] Sorin Soviany: Studiu privind metode moderne de securizare a accesului la sisteme de comunicaţii de bandă largă, proiect PN 09-08 03 04 INSCC (faza 2, decembrie 2010). (Study on modern methods of securing access to broadband communication systems, project PN 09- 08 03 04 INSCC (phase 2, December 2010)
4. [4] Zhang Lufeng, Tang Hong: Network Security Evaluation through Attack Graph Generation, World Academy of Science Engineering and Technology 54 2009.
5. [5] M. Abedin, S. Nessa, E. Al-Shaer, and L. Khan, "Vulnerability analysis for evaluating quality of protection of security policies," in Proceedings of Quality of Protection 2006 (QoP '06), October 2006.