Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
1 Input: ; | 2 Initialize block status isBlocked for all and isBlocked for all | ; | 3 for with isBlockeddo | 4if then | 5if then | 6; | 7else | 8if then | 9; | 10 Return . |
|