1. Abstraction and refinement of layered security policy;Abrams,1995
2. Quantitative penetration testing with item response theory;Arnold,2013
3. Knowledge representation, reasoning and declarative problem solving;Baral,2003
4. Rational choice of security measures via multi-parameter attack trees;Buldas,2006
5. Analyzing consistency of security policies;Cholvy,1997