Research Article

New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks

Figure 1

An example attack graph.