Research Article

Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security

Figure 2

The communication layout of EPIC.