Research Article

Security Measurement for Unknown Threats Based on Attack Preferences

Figure 1

Multiattackers versus a certain company.