Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Figure 12

Service compromised probability of less aggressive attacker under circumstance.
518213.fig.0012