Return to Article Details System construction of cybersecurity vulnerabilities with Q-analysis Download Download PDF