Fig. 2From: Research on gray correlation analysis and situation prediction of network information securityThe results of comparison with the other modelsBack to article page