Research Article
A Novel Approach for Estimating Performance of IIoT-Based Virtual Control Train Sets under DoS Attacks
Figure 8
The energy distribution comparison of specific attacks strategies: (a) the random attacks strategy and (b) the optimal attacks strategy.
(a) |
(b) |