Today, many of our activities depend on the normal operation of the IT infrastructures that supports them. However, cyber-attacks on these infrastructures become more common and can lead to disastrous consequences. For that reason, efforts towards assessing the cyber-security of such infrastructures are being done. One way to achieve that is by using attack graph […]