Research Article

Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution

Figure 1

Schematic of the IIoT-based threat response metamodel. It shows the security concepts that can be used to instantiate TRMLang for further analysis, common understanding, and evaluation of complex attacks on control systems.