Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
| 1 Input: , , and inverse topological order of , ; | | 2 Initialize node values and for inactive goal nodes | | , all inactive nodes , and time step ; | | 3 for do | | 4for do | | 5for do | | 6if then | | 7; | | 8else | | 9; | | 10if then | | 11Update ; | | 12 Return , ; |
|