1. Jumping the air gap: modeling cyber-physical attack paths in the internet-of-things;Agadakos,2017
2. A2G2V: automatic attack graph generation and visualization and its applications to computer and scada networks;Al Ghazo;IEEE Trans. Syst. Man Cybern.,2019
3. Scalable analysis of interaction threats in IoTsystems;Alhanahnah,2020
4. Scalable, graph-based network vulnerability analysis;Ammann,2002
5. Assange, J., 2017. Vault 7: cia hacking tools revealed. WikiLeaks.(Mar. 2017). Retrieved Mar 7, 2017.