then uses an event tree to develop a set of compromise paths. Probability models are developed for each of the compromise … insider and visitor intelligence collectors has been developed based on an event-tree analysis of the intelligence collection … paths that user parameters based on expert judgment or historical data on security violations. The resulting probability …