Research Article

Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing

Table 2

Payoff structure 1.

Defender rewardDefender penaltyAttacker rewardAttacker penalty

3−78−3
5−97−5
6−45−4
6−23−7
7−98−5
7−66−3
5−39−8