Fig. 9From: A security event description of intelligent applications in edge-cloud environmentCOP model generated based on attack scenario informationBack to article page