Research Article
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks
Algorithm 1
Solving algorithm for optimal strategy of intrusive mimic relation detection.
| | Input: | | | Output: Optimized Solution | | (1) | if then | | (2) | if then | | (3) | executes strategy | | (4) | end | | (5) | else | | (6) | There is no optimal strategy. | | (7) | end | | (8) | if then | | (9) | executes strategy | | (10) | end | | (11) | else | | (12) | There is no optimal strategy. | | (13) | end | | (14) | end | | (15) | else | | (16) | if then | | (17) | executes strategy | | (28) | end | | (19) | else | | (20) | There is no optimal strategy. | | (21) | end | | (22) | end | | (23) | End |
|