Fig. 2
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense

The execution flow in the ASSERT system
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
The execution flow in the ASSERT system