Research Article

Using a Prediction Model to Manage Cyber Security Threats

Figure 1

Residual plot.