Research Article

Computer Network Information System Security Prevention Methods under the Background of Big Data

Figure 5

Trend chart of experimental results.