Research Article

Vulnerability Analysis of CSP Based on Stochastic Game Theory

Table 1

Priorities, rewards, costs, and detection probabilities of attack actions.

Priority Action

1 +30 −30 0.3
2 +20 −20 0.8
3 +10 −10 0.6
4 0 0