I Kotenko, M Stepashkin - International Journal of Computer …, 2006 - researchgate.net
The approach to network security analysis is suggested. It is based on simulation of
malefactor's behavior, generating attack graph and calculating different security metrics. The …