Research Article
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
| Test case name | Detection of intrusion feature knowledge base retrieval |
| Preconditions | The user has system permission to log in to the system | Test process | Log in to the system and enter the search interface of intrusion feature knowledge base | Submit after filling in the query statement | Expected results | The system returns intrusion features consistent with user query information | Actual results | Consistent with expected results |
|
|