Research Article

Computer Network Confidential Information Security Based on Big Data Clustering Algorithm

Figure 4

Comparison of false positive rate detection results.