Fig. 4From: Optimal monitoring and attack detection of networks modeled by Bayesian attack graphsThe average number of monitoring each node obtained for 10-node BAG by various policiesBack to article page