239 research outputs found
The penetration topology deployed with decoy chains.
<p>The penetration topology deployed with decoy chains.</p
Comparison of <i>PPI</i> with different topologies and <i>ξ</i>.
<p>Comparison of <i>PPI</i> with different topologies and <i>ξ</i>.</p
The schematic illustration of DCD system.
<p>The schematic illustration of DCD system.</p
Comparison of the length of penetration paths with and without DCD.
<p>Comparison of the length of penetration paths with and without DCD.</p
Comparison of traffic cost and number of running servers among the three methods.
<p>Comparison of traffic cost and number of running servers among the three methods.</p
Penetration probability from one attack source node to sensitive target set using recursion traversing.
<p>Penetration probability from one attack source node to sensitive target set using recursion traversing.</p
An example of layer structure of penetration topology.
<p>An example of layer structure of penetration topology.</p
- …