This repository complements the paper:
Revisiting Attack Trees for Modeling Machine Pwning in Training Environments
which was accepted at The Third Intelligent Cybersecurity Conference (ICSC2023)
https://www.icsc-conference.org/2023/index.php
AUTHORS: Khouloud Samrouth, Mohamad Nassar and Hussein Harb
Appendix A: Examples of attack trees
Appendix B: Generating Attack Trees with Mermaid
Appendix C: Conversation With ChatGPT Using the Attack Tree of the Machine Garaa