Research Article

Prediction of Computer Network Security Situation Based on Association Rules Mining

Figure 6

Comparison of peak memory usage in massive alarm log mining.