Fig. 6From: The key technology of computer network vulnerability assessment based on neural networkTraining results of network fault samplesBack to article page