Research Article

Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

Figure 5

Attack tree of the Internet security system.