Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
Algorithm 4
Compute Propagated Defense Reward.
1 Input: time step, , graph state, , inverse topological order of , ; | 2 Initialize defense reward and for all nodes | and inactive goals , for all time steps ; | 3 for do | 4 for do | 5for do | 6if then | 7; | 8else | 9; | 10if then | 11Update ; | 12 Return , ; |
|