Research Article
New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks
Table 2
Enumerations of EAIPs in Figure
3.
| V1 | V2 | EAIP(S3) | EAIP(S4) | V1 | V2 | EAIP(S3) | EAIP(S4) |
| 0.2 | 0.2 | 0.67 | 0.33 | 0.4 | 0.2 | 0.6 | 0.4 | 0.2 | 0.4 | 0.75 | 0.25 | 0.4 | 0.4 | 0.67 | 0.33 | 0.2 | 0.6 | 0.8 | 0.2 | 0.4 | 0.6 | 0.71 | 0.29 | 0.2 | 0.8 | 0.83 | 0.17 | 0.4 | 0.8 | 0.75 | 0.25 | 0.2 | 1 | 0.86 | 0.14 | 0.4 | 1 | 0.78 | 0.22 | … | … | … | … | … | … | … | … |
| V1 | V2 | EAIP(S3) | EAIP(S4) | V1 | V2 | EAIP(S3) | EAIP(S4) |
| 0.6 | 0.2 | 0.57 | 0.43 | 0.8 | 0.2 | 0.56 | 0.44 | 0.6 | 0.4 | 0.63 | 0.37 | 0.8 | 0.4 | 0.6 | 0.4 | 0.6 | 0.6 | 0.67 | 0.33 | 0.8 | 0.6 | 0.64 | 0.36 | 0.6 | 0.8 | 0.7 | 0.3 | 0.8 | 0.8 | 0.67 | 0.33 | 0.6 | 1 | 0.73 | 0.27 | 0.8 | 1 | 0.69 | 0.31 | … | … | … | … | … | … | … | … |
|
|