Sign in

A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow.

Huan WangZhanfang ChenJianping ZhaoXiaoqiang DiDan Liu
Published in: IEEE Access (2018)
Keyphrases
  • cost function
  • pairwise
  • maximum flow
  • unsupervised learning
  • lot sizing