Research Article
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models
Algorithm 2
Algorithm to generate a full AG.
| procedure fullAG | | Markvisited | | | | if then | | Return Stack | | else if then | | for do | | | | if is uniquely alignedthen | | fullAG | | end if | | end for | | else | | | | end if | | end procedure |
|