Evaluation for network security based on the Read-Write transition model | IEEE Conference Publication | IEEE Xplore