Research Article
New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks
Table 3
Enumerations of EAPLs in Figure
3.
| V1 | V2 | EAPL | V1 | V2 | EAPL |
| 0.2 | 0.2 | 2 | 0.4 | 0.2 | 3 | 0.2 | 0.4 | 1.5 | 0.4 | 0.4 | 2 | 0.2 | 0.6 | 1.33 | 0.4 | 0.6 | 1.67 | 0.2 | 0.8 | 1.25 | 0.4 | 0.8 | 1.5 | 0.2 | 1 | 1.2 | 0.4 | 1 | 1.4 | … | … | … | … | … | … |
| V1 | V2 | EAPL | V1 | V2 | EAPL |
| 0.6 | 0.2 | 4 | 0.8 | 0.2 | 5 | 0.6 | 0.4 | 2.5 | 0.8 | 0.4 | 3 | 0.6 | 0.6 | 2 | 0.8 | 0.6 | 2.33 | 0.6 | 0.8 | 1.75 | 0.8 | 0.8 | 2 | 0.6 | 1 | 1.6 | 0.8 | 1 | 1.8 | … | … | … | … | … | … |
|
|