Research Article
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks
Algorithm 1
Solving algorithm for optimal strategy of intrusive mimic relation detection.
| Input: | | Output: Optimized Solution | (1) | if then | (2) | if then | (3) | executes strategy | (4) | end | (5) | else | (6) | There is no optimal strategy. | (7) | end | (8) | if then | (9) | executes strategy | (10) | end | (11) | else | (12) | There is no optimal strategy. | (13) | end | (14) | end | (15) | else | (16) | if then | (17) | executes strategy | (28) | end | (19) | else | (20) | There is no optimal strategy. | (21) | end | (22) | end | (23) | End |
|