Research Article

Prediction of Computer Network Security Situation Based on Association Rules Mining

Figure 7

Comparison of mining frequent item sets.