Research Article
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks
Table 2
Action set of the participants.
| | Participants | Action set |
| | Master system service | | | | Multiredundancy edge computing terminal intrusion | | | | Single-redundancy edge computing terminal service | | | | Normal users | | | | Attackers (malicious users) | | |
|
|