Research Article

Consider the Consequences: A Risk Assessment Approach for Industrial Control Systems

Figure 3

Example of cyber-event impact propagation.