236 research outputs found

    FlowMover framework.

    No full text
    <p>FlowMover framework.</p

    The penetration topology deployed with decoy chains.

    No full text
    <p>The penetration topology deployed with decoy chains.</p

    Abbreviations.

    No full text
    <p>Abbreviations.</p

    Comparison of <i>PPI</i> with different topologies and <i>ξ</i>.

    No full text
    <p>Comparison of <i>PPI</i> with different topologies and <i>ξ</i>.</p

    The schematic illustration of DCD system.

    No full text
    <p>The schematic illustration of DCD system.</p

    Comparison of the length of penetration paths with and without DCD.

    No full text
    <p>Comparison of the length of penetration paths with and without DCD.</p

    A scenario for reducing energy consumption.

    No full text
    <p>A scenario for reducing energy consumption.</p

    Encouragement function curves.

    No full text
    <p>Encouragement function curves.</p

    Comparison of traffic cost and number of running servers among the three methods.

    No full text
    <p>Comparison of traffic cost and number of running servers among the three methods.</p

    Penetration probability from one attack source node to sensitive target set using recursion traversing.

    No full text
    <p>Penetration probability from one attack source node to sensitive target set using recursion traversing.</p
    corecore