Research Article

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis

Figure 6

ENV distribution of attacker arising with different middle alert nodes from different source alert nodes.