Research Article

An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks

Figure 7

Running time and memory usage considering different numbers of devices in Algorithm 1.