Figure 4
From: Reliability model of the security subsystem countering to the impact of typed cyber-physical attacks

Dependences \(p_{l} \left( t \right)\), \(l = \overline{0,4}\), at \(t \in \left[ {0,3} \right]\), calculated for the SC system using the concept presented in section “The concept of solving the Chapman equation system for the model of the studied process”.