1. Internet security threat report;Nahorney;Symantec Corp.,2016
2. Using attack and protection trees to analyze threats and defenses to homeland security;Edge,2006
3. The use of attack and protection trees to analyze security for an online banking system;Edge,2007
4. Threat risk analysis for cloud security based on attack-defense trees;Wang,2012
5. Attack trees;Schneier;Dr. Dobb’s J.,1999