Research Article

Prediction of Computer Network Security Situation Based on Association Rules Mining

Figure 4

Performance comparison of small-scale alarm log mining algorithms.