Figure 5
From: Reliability model of the security subsystem countering to the impact of typed cyber-physical attacks

Proving the adequacy of the mathematical apparatus proposed in section “Models and methods”.
From: Reliability model of the security subsystem countering to the impact of typed cyber-physical attacks
Proving the adequacy of the mathematical apparatus proposed in section “Models and methods”.