Research Article

GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks

Algorithm 1

Solving algorithm for optimal strategy of intrusive mimic relation detection.
Input:
Output: Optimized Solution
(1)if then
(2)if then
(3)  executes strategy
(4)end
(5)else
(6)  There is no optimal strategy.
(7)end
(8)if then
(9)  executes strategy
(10)end
(11)  else
(12)   There is no optimal strategy.
(13)  end
(14)end
(15)else
(16)  if then
(17)   executes strategy
(28)end
(19)  else
(20)   There is no optimal strategy.
(21)  end
(22)end
(23)End