Fig. 4From: The key technology of computer network vulnerability assessment based on neural networkChanges of hidden layer neurons and layer number under BP neural networkBack to article page