Review Article

Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing

Figure 4

Optional attack graph A.