diff --git a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp index cd2a145ca2c603996ff21ef0e10824b333035224..b8dd6820a7900f0d0053b8186b1c86124d405687 100644 --- a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp +++ b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp @@ -57,7 +57,10 @@ Palmieri, Margaret. "Assessing and Visualizing Risk in Monterey Phoenix Through a Supply Chain Cyber-Attack Use Case." NPS Master's Thesis, Monterey, CA: September 2021. -Search terms: +Search terms: behavior, supply chain; coordination, event; +cyber threat; cyber-attack; event attribute, number; table; +trace annotation; risk score; risk analysis; SAY statement; +MARK command; report, global Instructions: