Fig. 9From: Analysis framework of network security situational awareness and comparison of implementation methodsLogic access modeling results of risk diffusion for experimental networkBack to article page