1. P. Ammann, D. Wijesekera, S. Kaushik, Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02), pp. 217–224, 2002.
2. M. Dacier, Towards quantitative evaluation of computer security. Ph.D. Thesis, Institut National Polytechnique de Toulouse, 1994.
3. R. Deraison, Nessus scanner, 1999. Available at .
4. D. Farmer, E.H. Spafford, The COPS security checker system. In USENIX Summer, pp. 165–170, 1990.
5. Topological analysis of network attack vulnerability;Jajodia,2003