Research Article

New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks

Table 2

Enumerations of EAIPs in Figure 3.

V1V2EAIP(S3)EAIP(S4)V1V2EAIP(S3)EAIP(S4)

0.20.20.670.330.40.20.60.4
0.20.40.750.250.40.40.670.33
0.20.60.80.20.40.60.710.29
0.20.80.830.170.40.80.750.25
0.210.860.140.410.780.22

V1V2EAIP(S3)EAIP(S4)V1V2EAIP(S3)EAIP(S4)

0.60.20.570.430.80.20.560.44
0.60.40.630.370.80.40.60.4
0.60.60.670.330.80.60.640.36
0.60.80.70.30.80.80.670.33
0.610.730.270.810.690.31