Research Article

GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks

Table 2

Action set of the participants.

ParticipantsAction set

Master system service
Multiredundancy edge computing terminal intrusion
Single-redundancy edge computing terminal service
Normal users
Attackers (malicious users)