Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Figure 3

A portion of the Bayesian attack graph of the testbed network in Poolsappasit et al. [18].