Fig. 9From: The design of network security protection trust management system based on an improved hidden Markov modelComparison between the two prediction models and the real value when the change amplitude of trust level is equal to 3Back to article page