Research Article

Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

Figure 5

Flow graph of quantitative measurement for vulnerability set.