Research Article

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Figure 16

Comparison of service compromised probability under diverse contest intensity and aggressiveness.
518213.fig.0016