Fig. 14From: Analysis framework of network security situational awareness and comparison of implementation methodsAttack graphical analysis [140] and visualize simplified [176]Back to article page