Research Article
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution
Figure 2
Schematic of attack and defense of small control network. It contains two examples of attack simulation, which can express the correlation between attack and defense.