Identifying interdependencies using attack graph generation methods | IEEE Conference Publication | IEEE Xplore