1. R. Deraison, Nessus scanner, (http://www.nessus.org), Accessed September, 2018.
2. Retina IoT (RIoT) Scanner, (https://www.beyondtrust.com/resources/data-sheet/retina-iot-riot-scanner/), [Accessed September 2018], 2018.
3. An annotated review of past papers on attack graphs;Lippmann,2005
4. Partial cuts in attack graphs for cost effective network defence;Sawilla,2012
5. Towards scalable security analysis using multi-layered security models;Hong;J. Netw. Comput. Appl.,2016