Fig. 4From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defenseWGI over iterations with shufflingBack to article page