Research Article

Network Security Situation Assessment Model Based on Extended Hidden Markov

Figure 5

CPU utilization sequence.