Skip to main content

Table 8 Comparison results of each model

From: Analysis framework of network security situational awareness and comparison of implementation methods