Simulation and Game-Theoretic Analysis of an Attacker-Defender Game Alan Nochenson, and C.F. Larry Heimann
Here is the Python implementation of this article. Also added the ability to process data from various network vulnerability scanners.
The main program code is located in the mainModel.ipynb
file. The results obtained in the course of work are in the resultsModel.ipynb
file