Fig. 2From: Optimal monitoring and attack detection of networks modeled by Bayesian attack graphsThe 10-node BAG used for the first set of experimentsBack to article page