Review Article

Use of Attack Graphs in Security Systems

Figure 3

Classification.