Research Article
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution
Figure 1
Schematic of the IIoT-based threat response metamodel. It shows the security concepts that can be used to instantiate TRMLang for further analysis, common understanding, and evaluation of complex attacks on control systems.