Research Article

Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution

Figure 2

Schematic of attack and defense of small control network. It contains two examples of attack simulation, which can express the correlation between attack and defense.