Sommestad, Teodor; Sandström, Fredrik - In: Information & Computer Security 23 (2015) 5, pp. 516-531
Purpose – The purpose of this paper is to test the practical utility of attack graph analysis. Attack graphs have been proposed as a viable solution to many problems in computer network security management. After individual vulnerabilities are identified with a vulnerability scanner, an attack...