Research Article
New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks
Algorithm 3
Pseudocode for EAPL evaluation algorithm.
INPUT: | OUTPUT: Matrix T, LengRank | BEGIN | Use Algorithm 1 to construct the matrix P | Construct matrix Q, matrix R from P by Definition 11 | Construct matrix | Calculate matrix | FOR to t | Rank in in descending order and record as LengRank | Return T and LengRank | END |
|