Research Article

Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing

Table 1

Example of two targets security game.

TargetAttackerDefender
CoveredUncoveredCoveredUncovered

T12002āˆ’2
T20āˆ’20024