Review Article

Use of Attack Graphs in Security Systems

Figure 1

Attack graph example: system.