Fig. 10
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense

\(\tilde {q}^{n}(\Omega)\) and \(\tilde {q}^{n}(G)\) over iterations for the target port
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
\(\tilde {q}^{n}(\Omega)\) and \(\tilde {q}^{n}(G)\) over iterations for the target port