Research Article

Quantitative Method for Network Security Situation Based on Attack Prediction

Figure 2

Experimental network topology.