Research Article

[Retracted] Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments

Figure 5

Original frequency values, probability values, and recalculated frequency values for each of the identified threats.