Closed andrewbwm closed 3 years ago
Create supply chain attacks and defences. These were introduced to address the MITRE Supply Chain Compromise techniques.
The implementation is based on @skatsikeas's work on supply chain attacks in icsLang.
Create supply chain attacks and defences. These were introduced to address the MITRE Supply Chain Compromise techniques.
The implementation is based on @skatsikeas's work on supply chain attacks in icsLang.