Research Article

Optimal Management of Computer Network Security in the Era of Big Data

Figure 5

Comparison of detection rates of four methods.