Skip to main content
. 2015 Jan 13;15(1):1365–1388. doi: 10.3390/s150101365

Algorithm 2: The paths()algorithm to find possible intruder paths.

Data: s,p,tmin,tmax,TU,NU,tf,S,P(S)
1 Γ ← adjacentNodes(s(|s|), G)); l ← |Γ|
2 while l > 0 do
3 Tmax(l)tmax+ds(|s|),Γ(l)min(υint)
4 for (tU, nU) ∈ (TU, NU) do
5   if Γ(l) = nU then
6    if Tmax(l)tUthen
7     Γ ← Γ \ {Γ(l)}
8      TmaxTmax\{Tmax(l)}
9    break
10 l ← (l — 1)
11 for l ← 1 to |Γ| do
12 s[sΓ(l)];pp×1|Γ|
13 tmintmin+ds(|s|),Γ(l)max(υint)
14 if tmintfthen
15   SS ∪ {s′}; P(S = s′) ← p′
16 else
17   (S,P(S)) ← paths (s,p,tmin,Tmax(l),TU,NU,tf,S,P(S))
Result: S,P(S)