Fig. 3From: The design of network security protection trust management system based on an improved hidden Markov modelThe structure of multiple HMMBack to article page