Research Article

Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory

Figure 1

The process of network attack-defense. (a) Attack-defense process of multistep attacks. (b) Network security state transition.