Research Article

A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models

Figure 12

Cost sensitivity analysis. (a) Loss cost vs. total cost. (b) Response cost vs. total cost.
(a)
(b)