Research Article

Game Theoretical Method for Anomaly-Based Intrusion Detection

Figure 1

Payoff of the attacker with respect to if is fixed as .