supposed that the common approach to attack modeling and impact assessment is based
on representing malefactors' behavior, generating attack graphs, calculating security metrics
and providing risk analysis procedures. The main aspects outlined are achieving near-real
time mode, event analysis and prognosis mechanisms, security and impact assessment. To
optimize the attack graph generation and security evaluation we apply an anytime approach …