Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach

Security incidents targeting control systems and the industrial internet of things (IIoT) are on the rise as attackers gain a better understanding of the nature of these systems and their increasing connectivity to information technology (IT). Every year, the number of vulnerabilities associated wit...

Full description

Bibliographic Details
Main Authors: Seong-Su Yoon, Do-Yeon Kim, Ka-Kyung Kim, Ieck-Chae Euom
Format: Article
Language:English
Published: MDPI AG 2023-11-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/22/12180