MA Alhomidi,
MJ Reed - 2012 4th Computer Science and …, 2012 - ieeexplore.ieee.org
Attack graphs have been widely used to represent and analyze security attacks. More
specifically, they show all ways of how an attacker violets a security policy. Most attack …