Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
Figure 10
Strategy evaluation, layered DAGs, 0%-nodes.
| (a) Attacker, high noise |
| (b) Attacker, low noise |
| (c) Attacker, no noise |
| (d) Defender, high noise |
| (e) Defender, low noise |
| (f) Defender, no noise |