Skip to main content
. 2020 Aug 15;22(8):894. doi: 10.3390/e22080894
Algorithm 2 MPC-DSPTI: MPC Strategy for DSPTI
  • 1:

    Initialize Y^, z_, z¯+, x^0, t0

  • 2:

    while|Vs|<|V|do

  • 3:

          Malware Detection: obtain a set Vd(t)

  • 4:

          if Vd(t) then

  • 5:

             Defender’s Decision: solve LG-SSPTI(t) for xt

  • 6:

             Malware Interdiction: allocate countermeasures

             according to xt

  • 7:

          Attacker’s Decision: solve [Sub(xt)] for yt

  • 8:

          Malware propagation: penetrate the CPS based on yt

  • 9:

          tt+1