Table 3. Threat analysis and risk assessment regarding sensors and data acquisition

From

Creating a Comprehensive Assessment of Cyber Risks

Cheryl Ann Alexander, Lidong Wang

American Journal of Software Engineering. 2024, 7(1), 1-7 doi:10.12691/ajse-7-1-1