Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
Algorithm 1
State transition for node
, according to
.| 1 Initialize ; | | 2 if then | | 3; // defender overrules attacker | | 4 else | | 5if then | | 6with probability , | | 7else | | 8for do | | 9with probability , |
|