Fig. 5From: Optimal monitoring and attack detection of networks modeled by Bayesian attack graphsThe average attack detection error and the total monitored nodes with respect to available resource m obtained for 10-node BAG by various policiesBack to article page