| Input: , , ,P,R, , | | Output: , //Optimal attack and defense strategies | | begin | (1) | {, , ,…, }//Attack type space | (2) | {, , ,…, }//Defense type space | (3) | Compute , //attacker and defender’s maximum benefits | (4) | Output p {, , ,…, }//The attacker’s current round optimal mixed strategy set | (5) | Output q {, , ,…, }//The defender’s current round optimal mixed strategy set | (6) | Deploy , | (7) | Defender detection results //Check if an attack occurred. 0 did not occur. 1 did occur | (8) | if = = 1 | (9) | //Bayes’ rule is used to calculate the prior probability of the presence of attackers | (10) | else | (11) | | (12) | end if | (13) | //A transcendental belief correction, that is, the next round of defender’s transcendental belief | | end |
|