Research Article

Computer Network Information System Security Prevention Methods under the Background of Big Data

Figure 3

Comparison of experimental results of different models.