Research Article

Application of Bayesian Algorithm in Risk Quantification for Network Security

Figure 4

State collection diagram of variables in the model.