% Authors : Barbara Kordy (barbara.kordy@uni.lu)
%           Patrick Schweitzer (patrick.schweitzer@uni.lu)
% Date : 25/06/2012
% (c) 2012 University of Luxembourg - Interdisciplinary Centre for Security 
% Reliability and Trust (SnT)
% All rights reserved

\documentclass{article}

\usepackage{ADT_web}
\usepackage[labelformat=empty]{caption}
\pagestyle{empty}

%------------------------------------------------------------------------------
\begin{document}


\begin{figure}[htb]
\centering
\psscalebox{0.7}{
\pstree[levelsep=80pt]{\NNodeA{rsuqwuruvt}{Open\\Door}}{
\pstree{\NNodeA{rxytqsussz}{Brute\\force}}{
\pstree{\NNodeBC{rtqruqwvwv}{Rein-\\forced\\door}}{
}
}

\pstree{\NNodeA{xssvqttrt}{Open\\Lock}}{
\pstree{\NNodeA{rvvtsvzyuw}{Get key}}{
\pstree{\NNodeA{wrzrztswq}{Steal Key}}{
}

\pstree{\NNodeA{xvtwxuvy}{Copy key}}{
}

\pstree{\NNodeA{rytszzyvst}{Return\\key}}{
}

}
\Bogen{rvvtsvzyuw}{wrzrztswq}{rytszzyvst}
\pstree{\NNodeA{ysxqryxzq}{Pick lock}}{
\pstree{\NNodeBC{xxyvwyuy}{Suspicion}}{
\pstree{\NNodeB{rrzqwuqruw}{Motion}}{
\pstree{\NNodeAC{ytwtrrqxw}{Break}}{
}
}

\pstree{\NNodeB{vzzxyuxrx}{Passer-by}}{
\pstree{\NNodeAC{sztuzzwqr}{Bribe}}{
}
}
\Bogen{xxyvwyuy}{rrzqwuqruw}{vzzxyuxrx}
}
}

}
}
%Legend
\rput(-2,0){
  \begin{tabular}{|cl|}
  \hline
  \hspace{1ex}$\ACC$ & attack node\\
  \hspace{1ex}$\DCC$ & defense node\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    & disjunctive refinement\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    \psarc[linewidth=0.5pt](0,.3){0.2cm}{225}{288}
    & conjunctive refinement\\
  \hspace{1ex}\psline[linewidth=1pt,linestyle=dotted](0,.25)(0,-.05)
    & countermeasure\\
  \hline
  \end{tabular}
  }
}
\caption{How to open a locked door?}
\label{fig:exADTree}
\end{figure} 
\end{document}