Research Article

Security Measurement for Unknown Threats Based on Attack Preferences

Figure 2

Sample of .
(a) of attacking a video platform
(b) of attacking a bank