Research Article
Data Protection of Accounting Information Based on Big Data and Cloud Computing
Figure 9
The security index before and after the attack of the two schemes. (a) The security index of the two schemes before the attack. (b) The security index of the two schemes after the attack.
(a) |
(b) |