[1. Clarke, E. M., E. A. Emerson. Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic. - In: Proceedings of Logic of Programs, Vol. 131 of Lecture Notes in Computer Science, Workshop, Yorktown Heights, New York, 1981, 52-71.10.1007/BFb0025774]Search in Google Scholar
[2. Cuppens, F., F. Autrel, A. Miege, S. Benferhat. Recognizing Malicious Intention in an Intrusion Detection Process. - In: Second International Conference on Hybrid Intelligent Systems. Santiago, 2002.]Search in Google Scholar
[3. Huiying, Lv, R. Wang. Identifying Attacking Process Based on Attack State Transition Graph. - In: 3rd International Conference on Computer and Network Technology (ICCNT’2011), Tai Yuan, China, Vol. 4, 26-28 February 2011, 395-400.]Search in Google Scholar
[4. Williams, L., R. Lippmann, K. Ingols. GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. - In: Viz Sec’2008, LNCS 5210, 2008, 44-59.]Search in Google Scholar
[5. Ning, P., D. Xu. Learning Attack Strategies from Intrusion Alerts. - In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003, 200-209.10.1145/948109.948137]Search in Google Scholar
[6. Sheyne r, O., J. Haines, S. Jh a, R. Lippmann, J. M. Wing. Automated Generation and Analysis of Attack Graphs. - In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, 2002, 273-284.]Search in Google Scholar
[7. Lippmann, R., K. Ingols, C. Scottet al. Validating and Restoring Defence in Depth Using Attack Graphs. - In: Military Communications Conference, Washington, DC, USA, 2006.10.1109/MILCOM.2006.302434]Search in Google Scholar
[8. Noel, S., S. Jajodi a. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. - In: Proceedings of the 21st Annual Computer Security Applications Conference, Tucson, AZ, 2005, 160-169.]Search in Google Scholar
[9. Martel, S. A New Model for Computer Network Security Risk Analysis. Ph D Paper, Department of System Computer Engineering, Carleton University, Ottawa, Ontario, May 2002.]Search in Google Scholar
[10. Wang, C., G. Huan g. Network Threat Analysis Based on Vulnerability Relation Model. - Journal of Computer Applications, Vol. 30, 2010, No 11, 3046-3050.10.3724/SP.J.1087.2010.03046]Search in Google Scholar
[11. Chen, Y., B. Boeh m, L. Sheppard. Value Driven Security Threat Modelling Based on Attack Path Analysis. - In: 40th Hawaii International Conference on System Sciences, 2007, 280-288.10.1109/HICSS.2007.601]Search in Google Scholar
[12. Yureik, W., C. Abad. UCLog+: A Security Situational Identification System for Incident Storage, Querying, and Correlation. - In: Proceedings of the 14th International Conference on Telecommunication Systems Modelling and Analysis (ICTSM), 2006, 316-322. ]Search in Google Scholar