Fig. 8From: The design of network security protection trust management system based on an improved hidden Markov modelComparison between two prediction models and the real value when the trust level change amplitude is less than 3Back to article page