Return to Article Details Research on the regularity of network security crimes based on mathematical models Download Download PDF