1. Security optimization of dynamic networks with probabilistic graph modeling and linear programming;Almohri;IEEE Trans. Dependable Secure Comput.,2015
2. Attribute evaluation on attack trees with incomplete information;Buldas;Comput. Secur.,2020
3. Modeling security threats;Schneier;Dr. Dobb’s J.,1999
4. A review of attack graph and attack tree visual syntax in cyber security;Lallie;Comp. Sci. Rev.,2020
5. Security modelling and analysis of dynamic enterprise networks;Enoch,2016