Figure 2. The proposed CPS methodology extends those in [11, 13] to take into account detailed vulnerability information and existing interactions while also assessing mitigation controls
All published articles are preserved here permanently: