Research Article

A Defense Strategy Selection Method Based on the Cyberspace Wargame Model

Table 1

Vulnerability price and level correspondence table.

LevelPrice

0$0
1$0-$1 k
2$1 k-$2 k
3$2 k–$5 k
4$5 k–$10 k
5$10 k–$25 k
6$25 k–$50 k
7$50 k–$100 k
8≥$100 k