Return to Article Details Methods and tools for attack modeling in large computer networks: state of the problem Download Download PDF