Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Table 1
Add equipment test cases.
Test case name
New authorized equipment
Test process
The user enters the interface of new authorized equipment and fills in the MAC address, IP address, transmission power, and other information of the equipment according to the interface prompt and submits it after completion
Expected results
Equipment information filled in by new users in the legal access point information table of the system