Login / Signup
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow.
Huan Wang
Zhanfang Chen
Jianping Zhao
Xiaoqiang Di
Dan Liu
Published in:
IEEE Access (2018)
Keyphrases
</>
cost function
pairwise
maximum flow
unsupervised learning
lot sizing