Review Article

Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing

Figure 2

Example of network topology.