Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Figure 8

Overview of the sampled-activation defense strategy.