Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Algorithm 4

Compute Propagated Defense Reward.
1 Input: time step, , graph state, , inverse topological order of , ;
2 Initialize defense reward and for all nodes
and inactive goals , for all time steps ;
3  for    do
4  for    do
5for    do
6if    then
7;
8else
9;
10if    then
11Update ;
12  Return , ;