H Wang, Z Chen, J Zhao, X Di, D Liu - Ieee Access, 2018 - ieeexplore.ieee.org
To solve the low attack path quantification degree and complex path finding in the industrial
Internet of Things, a vulnerability assessment method based on attack graph and maximum …