Fig. 2. Structural functional logic of vulnerability assessment frameworks.

Fig. 2