Research Article
[Retracted] Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments
Figure 5
Original frequency values, probability values, and recalculated frequency values for each of the identified threats.