K Kaynar - Journal of Information Security and Applications, 2016 - dl.acm.org
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …