Frage zu Artikel "Risk Propagation Assessment for Network Security.."