[1]
I. Kim and N. Park, “Methodology for Probabilistic Assessment of Attack Vectorfor Cyber Threat Scenario”, IJAST, vol. 28, no. 3, pp. 257 - 266, Sep. 2019.