Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
1 Input: , , and topological order of , ; | 2 Initialize , , and , for all active nodes ; | 3 Initialize , , and for all inactive root nodes ; | 4 for do | 5if then | 6Randomly choose a precondition to activate with probability | ; | 7Update ; | 8Update ; | 9Update ; | 10else | 11Update with respect to all preconditions ; | 12Update ; | 13Update ; | 14 Return ; |
|