Research Article

Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

Figure 2

“AND” node and “OR” node.