Fig. 12From: Analysis framework of network security situational awareness and comparison of implementation methodsClassification of network security situation aware solution analysis methodBack to article page