Fig. 10From: Optimal monitoring and attack detection of networks modeled by Bayesian attack graphsThe average attack detection accuracy with respect to the time step obtained by various policiesBack to article page