Research Article

An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks

Figure 6

Attack graph of the experimental environment.