Research Article

An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks

Figure 5

A hypothetical network topology from IT to OT networks.