Research Article
An Invocation Chain Test and Evaluation Method for Fog Computing
Algorithm 2
Atomic attack set construction algorithms.
ProcedureCreateAtomicAttacks(DM, Initial) | Input: DM, Initial. | Output: AA. | 1. ; | 2. Queue⟵Initial; | 3. Foreachin Initial Do | 4. ; | 5. While() | 6. ; | 7. Foreach DMin DM Do | 8. ; | 9. Foreach ackin AckfDo | 10 Ifackin AA Then. | 11. ; | 12. ForeachinDM.EffDo | 13. IfinThen | 14. ; | 15. ; | 16. Foreach ackin AA Do | 17. Foreach pinack.PreDo | 18. ; | 19. Foreachinack.EffDo | 20. ; | 21. Return AA. |
|