1. Attack Trees: Modeling Security Threats;Schneier B.;Dr.Dobbs Journal,1999
2. [ 2 ] A.T. Ali , D.P. Gruska , “ Attack Trees with Time Constraints ", in Proc. of the 28th International Workshop on Concurrency, Specification and Programming (CS&P2021) , 2021 , pp. 27 - 28 . [2] A.T. Ali, D.P. Gruska, “Attack Trees with Time Constraints", in Proc. of the 28th International Workshop on Concurrency, Specification and Programming (CS&P2021), 2021, pp. 27-28.
3. [ 3 ] Asif, Waqar, Indranil Ghosh Ray , and Muttukrishnan Rajarajan . “An attack tree based risk evaluation approach for the internet of things," in Proc. of the 8th International Conference on the Internet of Things , 2018 , pp. 1 - 8 . [3] Asif, Waqar, Indranil Ghosh Ray, and Muttukrishnan Rajarajan. “An attack tree based risk evaluation approach for the internet of things," in Proc. of the 8th International Conference on the Internet of Things, 2018, pp. 1-8.
4. [ 4 ] Schiele, Nathan Daniel , and Olga Gadyatskaya . " A Novel Approach for Attack Tree to Attack Graph Transformation ," International Conference on Risks and Security of Internet and Systems. Springer , 2022 , pp. 1 - 8 . [4] Schiele, Nathan Daniel, and Olga Gadyatskaya. "A Novel Approach for Attack Tree to Attack Graph Transformation," International Conference on Risks and Security of Internet and Systems. Springer, 2022, pp. 1-8.
5. On the Meaning and Purpose of Attack Trees