Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
Figure 14
Equilibrium analysis, layered DAGs, 0%-nodes, high noise, games 1–5.
| (a) Game 1 |
| (b) Game 2 |
| (c) Game 3 |
| (d) Game 4 |
| (e) Game 5 |