aka, Graphical Model for Security.
are a marriage between probability theory and graph theory [Stølen, GraMsec14].
represent potential attack or defense scenarios using visual structures (e.g., trees, graphs) to support analysis, reasoning, and decision-making about security.
explicitly capture potential attack paths and how adversaries may move through a system.
examples: attack graphs, attack trees, or Hierarchical Attack Representation Models (HARMs)