Review Article

Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing

Figure 9

Example of ROBDD attack graph.
(a)
(b)