Research Article

Network Security Situation Assessment Model Based on Extended Hidden Markov

Figure 8

Connections utilization sequence.