1Teodor Sommestad, Mathias Ekstedt,Lars Nordstsm,Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams[J].Power Delivery, 2009,24(4) : 1801-1808.
3Selmeier B. Attack trees:modeling security threats.Dr.Dobb's Journal, December 1999.
4Jha S, Sheyner O,Wing J. Minimization and reliability analyses of attack graphs. Technical Report, School of Computer Science Carnegie Mellon University, February 2002.