Research Article
G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network
| | Require: problem. | | Ensure: solution to the problem. | | (1) | if Get a problem then | | (2) | Decompose the problem. | | (3) | fordo | | (4) | Compare all the solutions for . | | (5) | Get the best solution: . | | (6) | Put into the . | | (7) | Combine all the from 1 to . | | (8) | Adjust and optimize all the . | | (9) | end for | | (10) | Adjust and optimize the whole solution. | | (11) | end if | | (12) | return The best solution. |
|