Review Article

Moving Target Defense Techniques: A Survey

Figure 4

Network configuration and its attack graph.