Research Article

Application of Bayesian Algorithm in Risk Quantification for Network Security

Figure 5

VaR values in different states.