Research Article

A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models

Figure 13

Specific node(s) vs. security evaluation time.