Research Article

Vulnerability Analysis of CSP Based on Stochastic Game Theory

Figure 6

The game play between attacker and system.