Return to Article Details 81.Simulation Research on Network Malicious Attack Data Identification System in Big Data Transmission Download Download PDF