Fig. 11
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense

\(\tilde {q}^{n}(\Omega)\) and \(\tilde {q}^{n}(G)\) over iterations for the signature
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
\(\tilde {q}^{n}(\Omega)\) and \(\tilde {q}^{n}(G)\) over iterations for the signature