Research Article

The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

Figure 3

Number of the infected hosts depending on protection mechanism used (FC-100%, VT-100%, NSS-100%, or without protection).
172583.fig.003