Figure 2: The trend of attack implementation over time under different defensive mechanisms.