Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Figure 14

Equilibrium analysis, layered DAGs, 0%-nodes, high noise, games 1–5.
(a) Game 1
(b) Game 2
(c) Game 3
(d) Game 4
(e) Game 5