\begin{thebibliography}{1} \bibitem{phillips_graph-based_1998} C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part F1292, pp.~71--79, 1998. \newblock doi: 10.1145/310889.310919. \bibitem{schneier_modeling_1999} B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999. \newblock vol. 24, no.12. \end{thebibliography}