Research Article
Quantitative Method for Network Security Situation Based on Attack Prediction
Table 7
Predictions of security situation in Exp. 1 (
).
| Rounds | M1 | M2 | M3 | M4 | M5 | Network |
| 0 | 2.26 | 3.97 | 0 | 0 | 0 | 1.02 | 1 | 2.26 | 3.97 | 6.44 | 4.47 | 0 | 3.20 | 2 | 2.26 | 3.97 | 6.75 | 5.32 | 0.63 | 3.62 | 3 | 2.26 | 3.97 | 6.75 | 6.04 | 1.76 | 4.11 | 4 | 2.26 | 3.97 | 6.75 | 6.70 | 2.12 | 4.35 | 5 | 2.26 | 3.97 | 6.75 | 6.70 | 2.44 | 4.44 |
|
|