Research Article

Optimal Management of Computer Network Security in the Era of Big Data

Figure 7

Comparison of detection rates of three models.