Fig. 6
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense

The \(\tilde {p}^{n}(\Omega)\) and \(\tilde {p}^{n}(G)\) for target IP as the alerts come into the system
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
The \(\tilde {p}^{n}(\Omega)\) and \(\tilde {p}^{n}(G)\) for target IP as the alerts come into the system