Research Article

Hybrid Network Defense Model Based on Fuzzy Evaluation

Figure 4

Schematic representation of a network intrusion.
178937.fig.004