Fig. 9From: Optimal monitoring and attack detection of networks modeled by Bayesian attack graphsThe 13-node BAG used for the second set of experimentsBack to article page