Return to Article Details The use of Petri nets for the evaluation of information security systems Download Download PDF