Research Article

Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing

Table 3

Payoff structure 2.

Defender rewardDefender penaltyAttacker rewardAttacker penalty

5−56−4
6−78−7
8−52−2
4−84−5
6−59−8
2−44−6
9−83−4