1. Augmenting attack graphs to represent data link and network layer vulnerabilities;Acosta,2016
2. Secure routing for internet of things: a survey;Airehrour;J Netw Comput Appl,2016
3. Defense trees for economic evaluation of security investments;Bistarelli,2006
4. Fault trees for security system design and analysis;Brooke;Comput Secur,2003
5. Modeling and detection of complex attacks;Camtepe,2007