Research Article

Vulnerability Analysis of CSP Based on Stochastic Game Theory

Table 3

Optimal strategies for rational attacker.

State 1
State 2
State 3
State 4
State 5
State 6
State 7
State 8