1. A. Aytaç, T. Turaci, Department of Mathematics, Ege University, 35100, Izmir, Turkey 2Department of Mathematics, Karabuk University, 78050, Karabuk, Turkey. Vulnerability measures of transformation graph Gxy+. Int. J. Found. Comput. Sci. 2015, 26(06):1550037.
2. T. Sommestad, F. Sandström, An empirical test of the accuracy of an attack graph analysis tool. Inf. Comput. Secur. 23(5), 516–531 (2015)
3. S. Abraham, S. Nair, A predictive framework for cyber security analytics using attack graphs. Int. J. Comput. Netw. Commun. 7(1), 266 (2015)
4. P. Bhandari, M. Singh, Formal specification of the framework for NSSA. Proc. Comput. Sci. 92(2), 23–29 (2016)
5. B. Mohammed, Penetration testing of vulnerability in android Linux kernel layer via an open network (Wi-Fi). Int. J. Comput. Appl. 134(6), 40–43 (2016)