Skip to content

Latest commit

 

History

History
4 lines (3 loc) · 390 Bytes

README.md

File metadata and controls

4 lines (3 loc) · 390 Bytes

Simulation and Game-Theoretic Analysis of an Attacker-Defender Game Alan Nochenson, and C.F. Larry Heimann

Here is the Python implementation of this article. Also added the ability to process data from various network vulnerability scanners.

The main program code is located in the mainModel.ipynb file. The results obtained in the course of work are in the resultsModel.ipynb file