8. Security vulnerability assessment: A review of Bayesian network approaches