Research Article

Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security

Figure 8

The time cost of the different NMM methods.