Skip to main content
Figure 5 | Security Informatics

Figure 5

From: Diversity and resistance in a model network with adaptive software

Figure 5

Percentage of shared software variants that effectively resist the receiving node’s current attack. Only variants received while the node was vulnerable were counted. Variants received too late were not counted. Network topologies are ordered from left to right by increasing number of edges. The data shown is for 1024 node networks.

Back to article page