Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Algorithm 2

Compute Attack Value.
1  Input: , , and inverse topological order of ,  ;
2  Initialize node values and for inactive goal nodes
, all inactive nodes , and time step ;
3  for    do
4for   do
5for    do
6if    then
7;
8else
9;
10if    then
11Update ;
12  Return , ;