Research Article

A Novel Approach for Estimating Performance of IIoT-Based Virtual Control Train Sets under DoS Attacks

Figure 8

The energy distribution comparison of specific attacks strategies: (a) the random attacks strategy and (b) the optimal attacks strategy.
(a)
(b)