Research Article

Computer Network Information System Security Prevention Methods under the Background of Big Data

Figure 4

Efficiency analysis of the improved AHP.