Research Article

Prediction of Computer Network Security Situation Based on Association Rules Mining

Figure 5

Comparison of mining time of massive alarm logs.