Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
Algorithm 4
Compute Propagated Defense Reward.
| 1 Input: time step, , graph state, , inverse topological order of , ; | | 2 Initialize defense reward and for all nodes | | and inactive goals , for all time steps ; | | 3 for do | | 4 for do | | 5for do | | 6if then | | 7; | | 8else | | 9; | | 10if then | | 11Update ; | | 12 Return , ; |
|