Research Article

Quality of Protection Evaluation of Security Mechanisms

Figure 2

Example enterprise network architecture.
725279.fig.002