K Kaynar, F Sivrikaya - IEEE Transactions on Dependable and Secure …, 2016 - computer.org
Attack graphs show possible paths that an attacker can use to intrude into a target network
and gain privileges through series of vulnerability exploits. The computation of attack graphs …