Skip to main content

Table 2 Sample simulation results

From: The key technology of computer network vulnerability assessment based on neural network

A1

A2

A3

A4

A5

0.2

0.597

0.191

0.697

0.232

0.3

0.218

0.650

0.479

0.238

0.3

0.174

0.710

0.954

0.196

0.7

0.498

0.301

0.973

0.131