1. http://www.graphviz.org/.
2. E. Al-Shaer, W. Marrero, A. El-Ataway and K. ElBadani. Network Security Configuration in A Box: End-to-End Security Configuration Verification. In ICNP’09, pp. 123-132, Princeton, NJ, October 2009.
3. L. Yuan, J. Mai, Z. Su, H. Chen, C. Chuah, and P. Mohapatra. FIREMAN: A Framework kit for Firewall Modeling and Analysis. In IEEE Symp. on Security and Privacy ,Oakland, USA, May 2006.
4. S. Majhi, S. Kumar, P. Bera, E. Al. Shaer, M. Satapathy. Synthesizing Optimal Security Configuration for Enterprise Network. In IET System Safety and Cyber Security, Manchester, UK, Oct 2014.
5. X. Ou, W.F. Boyer and M. A. McQueen. A scalable approach to attack graph generation. In 13th ACM CCS, 2006.