Adopting Centroid and Bandwidth to Shape Security Line | IEEE Conference Publication | IEEE Xplore