Research Article

Vulnerability Analysis of CSP Based on Stochastic Game Theory

Figure 4

A two-state stochastic process with security failure rate assigned.