Fig. 8From: A survey of methods supporting cyber situational awareness in the context of smart citiesThe categories of theoretical methods. Labels: —employed for dependency modeling, —employed for risk assessment, —employed for attack detectionBack to article page