Fig. 11From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense\(\tilde {q}^{n}(\Omega)\) and \(\tilde {q}^{n}(G)\) over iterations for the signatureBack to article page