Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

The architecture of RDAM.

More »

Fig 1 Expand

Fig 2.

Flow chart of Algorithm 1.

More »

Fig 2 Expand

Fig 3.

Communication between internal hosts.

More »

Fig 3 Expand

Fig 4.

Communication of an external host requesting a public host’s service.

More »

Fig 4 Expand

Fig 5.

The ratio of hosts missed by repeatable scanners.

(A) Scan domain names. (B) Scan IP addresses.

More »

Fig 5 Expand

Fig 6.

The ratio of hosts missed by non-repeat scanners in uniform mutation.

(A) Scan domain names. (B) Scan IP addresses.

More »

Fig 6 Expand

Fig 7.

The ratio of hosts missed by non-repeat scanners in failure-prior mutation.

(A) Scan domain names. (B) Scan IP addresses.

More »

Fig 7 Expand

Fig 8.

Propagation of worms based on IP address and domain name scanning.

More »

Fig 8 Expand

Fig 9.

Flow table lengths for different session establishment rates.

More »

Fig 9 Expand

Table 1.

Operation delay with and without RDAM.

More »

Table 1 Expand