Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Algorithm 1

State transition for node , according to .
1 Initialize ;
2  if    then
3; // defender overrules attacker
4  else
5if        then
6with probability ,
7else
8for        do
9with probability ,