Research Article

An Adaptive Multiexecutors Scheduling Algorithm Based on Heterogeneity for Cyberspace Mimic Defense

Figure 5

Vulnerability topology graph.
(a)
(b)