Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Figure 13

Service compromised probability of less aggressive attacker under circumstance.
518213.fig.0013