Fig. 3From: The key technology of computer network vulnerability assessment based on neural networkDesign of network nonlinear mapping processBack to article page