239 research outputs found

    The penetration topology deployed with decoy chains.

    No full text
    <p>The penetration topology deployed with decoy chains.</p

    Comparison of <i>PPI</i> with different topologies and <i>ξ</i>.

    No full text
    <p>Comparison of <i>PPI</i> with different topologies and <i>ξ</i>.</p

    The schematic illustration of DCD system.

    No full text
    <p>The schematic illustration of DCD system.</p

    FlowMover framework.

    No full text
    <p>FlowMover framework.</p

    Comparison of the length of penetration paths with and without DCD.

    No full text
    <p>Comparison of the length of penetration paths with and without DCD.</p

    Encouragement function curves.

    No full text
    <p>Encouragement function curves.</p

    Comparison of traffic cost and number of running servers among the three methods.

    No full text
    <p>Comparison of traffic cost and number of running servers among the three methods.</p

    Penetration probability from one attack source node to sensitive target set using recursion traversing.

    No full text
    <p>Penetration probability from one attack source node to sensitive target set using recursion traversing.</p

    An example of layer structure of penetration topology.

    No full text
    <p>An example of layer structure of penetration topology.</p
    • …
    corecore