Review Article

Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing

Figure 8

Hidden Markov model.