Fig. 4From: Analysis framework of network security situational awareness and comparison of implementation methodsHierarchical structure partition diagram of experimental networkBack to article page