Research Article

Consider the Consequences: A Risk Assessment Approach for Industrial Control Systems

Figure 8

BAG of test network with one detected attack.