Review Article

Use of Attack Graphs in Security Systems

Figure 2

Attack graph example: graph.