1. Beyond 2014
2. A review of attack graph and attack tree visual syntax in cyber security [J]. Computer Science Review, 2020,35 (Feb): 100219.1–100219.41.
3. A Model Study for the Quantitative Assessment of Network Security [J];Lu;Computer Engineering and Science,2009
4. Attack trees: modeling security threats[J];Schneier;Dr Dobb’s Journa1,1999
5. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders [C];Ray;ESORICS,2005