Research Article

Modelling the Mimic Defence Technology for Multimedia Cloud Servers

Figure 2

Example of the attack process.