Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
Algorithm 1
State transition for node
, according to
.1 Initialize ; | 2 if then | 3; // defender overrules attacker | 4 else | 5if then | 6with probability , | 7else | 8for do | 9with probability , |
|