Fig. 5From: The key technology of computer network vulnerability assessment based on neural networkSensitivity-level sample training resultsBack to article page