Introduction - If you have any usage issues, please Google them yourself
Establish network, draw network diagram and calculate network invulnerability index; Under random attack and intentional attack, the change of network invulnerability index is simulated.