Research Article

Vulnerability Analysis of CSP Based on Stochastic Game Theory

Figure 7

Security-related state transition diagram.