Research Article

Quantitative Method for Network Security Situation Based on Attack Prediction

Figure 4

Host security situation.
(a) Expected defense time-cost ( h)
(b) Expected defense time-cost ( h)