Fig. 10From: Analysis framework of network security situational awareness and comparison of implementation methodsSecurity attributes system and index calculation methodBack to article page