Research Article
Quantitative Method for Network Security Situation Based on Attack Prediction
Table 9
Predictions of security situation in Exp. 2 (
).
| Rounds | M1 | M2 | M3 | M4 | M5 | Network |
| 0 | 2.26 | 0 | 0 | 0 | 0 | 0.23 | 1 | 2.26 | 2.65 | 3.94 | 3.18 | 0 | 2.18 | 2 | 2.26 | 3.29 | 4.25 | 4.96 | 0.47 | 2.87 | 3 | 2.26 | 3.65 | 5.70 | 5.63 | 1.52 | 3.68 | 4 | 2.26 | 3.65 | 5.70 | 6.50 | 1.93 | 3.98 | 5 | 2.26 | 3.65 | 5.70 | 6.50 | 2.15 | 4.04 |
|
|