Research Article
[Retracted] Network Security Technology of Supply Chain Management Based on Internet of Things and Big Data
Table 1
Evaluation of network security technology of supply chain management based on IoT and big data.
| No | Security defense | No | Security defense | No | Security defense |
| 1 | 91.07 | 19 | 90.56 | 37 | 94.34 | 2 | 91.37 | 20 | 95.78 | 38 | 95.60 | 3 | 94.11 | 21 | 89.86 | 39 | 94.13 | 4 | 88.35 | 22 | 95.88 | 40 | 94.98 | 5 | 90.69 | 23 | 89.66 | 41 | 92.35 | 6 | 89.58 | 24 | 92.69 | 42 | 92.22 | 7 | 94.93 | 25 | 93.83 | 43 | 91.67 | 8 | 91.53 | 26 | 92.56 | 44 | 90.83 | 9 | 88.64 | 27 | 91.83 | 45 | 91.87 | 10 | 93.57 | 28 | 94.08 | 46 | 95.82 | 11 | 92.39 | 29 | 91.55 | 47 | 88.39 | 12 | 91.92 | 30 | 89.60 | 48 | 90.34 | 13 | 95.99 | 31 | 88.43 | 49 | 94.83 | 14 | 93.39 | 32 | 93.71 | 50 | 95.79 | 15 | 94.49 | 33 | 88.08 | 51 | 94.36 | 16 | 95.77 | 34 | 92.80 | 52 | 89.61 | 17 | 90.86 | 35 | 90.07 | 53 | 89.33 | 18 | 94.50 | 36 | 94.15 | 54 | 94.20 |
|
|