Fig. 3From: Analysis framework of network security situational awareness and comparison of implementation methodsNetwork security situational awareness operation mechanismBack to article page