Fig. 2From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defenseThe execution flow in the ASSERT systemBack to article page