Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
1 Input: , , and inverse topological order of , ; | 2 Initialize node values and for inactive goal nodes | , all inactive nodes , and time step ; | 3 for do | 4for do | 5for do | 6if then | 7; | 8else | 9; | 10if then | 11Update ; | 12 Return , ; |
|