Research Article

Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees

Figure 5

The flow chart of risk assessment.