Research Article

An Adaptive Multiexecutors Scheduling Algorithm Based on Heterogeneity for Cyberspace Mimic Defense

Figure 4

Threat of high-order vulnerability.
(a)
(b)
(c)