Fig. 2From: The design of network security protection trust management system based on an improved hidden Markov modelThe structure of HMMBack to article page