Research Article

Game Theoretical Method for Anomaly-Based Intrusion Detection

Table 4

The results about the inequality conditions in Theorems 3 and 5 with and .

Scenario L.4Scenario L.5

IC 3IC 5.1×
IC 5.2