Research Article

Optimal Management of Computer Network Security in the Era of Big Data

Figure 9

Comparison of different data scales.