%PDF-1.5
%
1 0 obj
<>stream
application/pdfIEEEIEEE Access; ;PP;99;10.1109/ACCESS.2023.3263671Extended Dependency Modelling Technique for Cyber Risk Identification in ICSDependency ModellingIndustrial Control SystemRiskRisk Identification MethodologiesAyodeji O. RotibiNeetesh SaxenaPete BurnapAlex Tarter
IEEE Access19910.1109/ACCESS.2023.3263671PP1
VoR
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
x+ |
endstream
endobj
4 0 obj
<>stream
x^[r}W)4$e8Z>h ,.9= @RJm93fr`0f?o0gqWU-p=+/~{LM)Ca^t(\#flbو~f[<f=&s4Q%'<\o\vūwjYn(RDU/!("ZKcW]Aţ
7o:fc=vRGYr
h&My+M~WUWnb~x~G|],|/988JW/o@858|#M>>OlqtvhL/}HpQ|Y8oGN9*hۮܳxqoޯ["Ren-7q