Fig. 3From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defenseThe overall entropy of G over timeBack to article page