Fig. 7
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense

The \(\tilde {p}^{n}(\Omega)\) and \(\tilde {p}^{n}(G)\) for target port as the alerts come into the system
From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense
The \(\tilde {p}^{n}(\Omega)\) and \(\tilde {p}^{n}(G)\) for target port as the alerts come into the system