Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
| 1 Input: ; | | 2 Initialize block status isBlocked for all and isBlocked for all | | ; | | 3 for with isBlockeddo | | 4if then | | 5if then | | 6; | | 7else | | 8if then | | 9; | | 10 Return . |
|