Research Article
Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory
Figure 1
The process of network attack-defense. (a) Attack-defense process of multistep attacks. (b) Network security state transition.