Fig. 2From: Graph database-based network security situation awareness data storage methodThe network topology of the experiment environment. This figure shows network topology of the experiment environment, which includes five data collection points A, B, C, D, and E in the network environmentBack to article page