Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
Figure 14
Equilibrium analysis, layered DAGs, 0%-nodes, high noise, games 1–5.
(a) Game 1 |
(b) Game 2 |
(c) Game 3 |
(d) Game 4 |
(e) Game 5 |