Research Article

Optimal Management of Computer Network Security in the Era of Big Data

Figure 8

Comparison of detection rate and false detection rate of three models.