Research Article

Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading

Figure 2

The devices state transition under cyber-attack.