Return to Article Details Security Assessment Based on Attack Graphs and Open Standards for Computer Networks with Mobile Components Download Download PDF