Skip to main content

Table 7 The λuv calculation results of each node’s in Fig. 10

From: Analysis framework of network security situational awareness and comparison of implementation methods