Research Article

Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees

Figure 2

Attack tree model structure.