Fig. 2From: The key technology of computer network vulnerability assessment based on neural networkAttack tree methodBack to article page