Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Figure 6

Overview of the defender belief update on graph states.