Fig. 1From: Optimal monitoring and attack detection of networks modeled by Bayesian attack graphsAn example of a Bayesian attack graphBack to article page