Research Article

Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security

Figure 10

The results on models with different depths.