Review Article

Comparison of Adaptive Information Security Approaches

Figure 2

MAPE adaptation loop.
482949.fig.002