Skip to main content

Table 2 Sample simulation results

From: The key technology of computer network vulnerability assessment based on neural network

A1 A2 A3 A4 A5
0.2 0.597 0.191 0.697 0.232
0.3 0.218 0.650 0.479 0.238
0.3 0.174 0.710 0.954 0.196
0.7 0.498 0.301 0.973 0.131