[1] S. Jha and J. M. Wing, “Survivability Analysis of Networked Systems,” Proceedings of the International Conference on Software Engineering, Toronto, Canada, May 2001.

[2] T. Hughes and O. Sheyner, “Attack Scenario Graphs for Computer Network Threat Analysis and Prediction,” Complexity 9, No. 2 (Nov./Dec. 2003): 15–18.

[3] O. Sheyner, “Scenario Graphs and Attack Graphs,” CMU Computer Science Department Technical Report CMU-CS-04-122, Ph.D. Dissertation, April 2004.

[4] NuSMV: A New Symbolic Model Checker, at http://afrodite.itc.it:1024/nusmv/.

[5] O. Sheyner, J. Haines, S. Jha, R. Lippman, and J. M. Wing, “Automated Generation and Analysis of Attack Graphs,” Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2002

Get Information Assurance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.