Research Article

Using a Prediction Model to Manage Cyber Security Threats

Figure 2

Normal probability plot.