“…Significant works have been developed and utilized based on arcane or original techniques such as the conditional probabilities [42], health analysis [43], bisection method [44], collocation method [45], Bayes classifier [46], cascading failure analysis [47], copula theory [48], cross-entropy methods [49], and bootstrap techniques [50]. Detailed comparisons between several methods have already been published [51] and research efforts in this area continue thriving [52][53][54]. Notwithstanding, despite the significant amount of literature, it seems that probabilistic security analysis has not yet gained large acceptance in the industry environment.…”