Research Article

New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks

Table 3

Enumerations of EAPLs in Figure 3.

V1V2EAPLV1V2EAPL

0.20.220.40.23
0.20.41.50.40.42
0.20.61.330.40.61.67
0.20.81.250.40.81.5
0.211.20.411.4

V1V2EAPLV1V2EAPL

0.60.240.80.25
0.60.42.50.80.43
0.60.620.80.62.33
0.60.81.750.80.82
0.611.60.811.8