View full-text article in PMC Entropy (Basel). 2022 May 10;24(5):668. doi: 10.3390/e24050668 Search in PMC Search in PubMed View in NLM Catalog Add to search Copyright and License information © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). PMC Copyright notice Algorithm 1. Attack Simulation. Input: N,SPHCP,SMICP,SDOSR,SRTPR,SPAR,SDOSF,SMITMF,VSECP,VPHCP,VMICP,VDOSR,VRTPR, VPAR,VDOSF,VMITMF Output: Attack data set X For n=1 to n=N, do Simulate VSECP If VSECP=1, then Simulate (SPHCP, SMICP) For i∈{PHCP,MICP} such that Si=1 in the previous step, simulate Vi Xn,1= {i∈{PHCP,MICP}|Vi=1 in the previous step} If |Xn,1|≠0, then For j∈Xn,1, do Simulate (SDOSR, SRTPR, SPAR) For i∈{DOSR,RTPR,PAR} such that Si=1 in the previous step, simulate Vi Xn,2,j={i∈{DOSR,RTPR,PAR}|Vi=1 in the previous step} Xn,2=∪j∈Xn,1Xn,2,j Remove repeated elements of Xn,2 If |Xn,2|≠0, then For k∈Xn,2 do Simulate (SDOSF, SMITMF) For i∈{DOSF,MITMF} such that Si=1 in the previous step, simulate Vi Xn,3,k= {i∈{DOSF,MITMF}|Vi=1 in the previous step} Xn,3=∪k∈Xn,2Xn,3,k Remove repeated elements of Xn,3 Xn={SECP}∪ Xn,1∪ Xn,2∪ Xn,3 Else Xn={SECP}∪ Xn,1 Else Xn={SECP} Else Xn=∅ X=∪n=1NXn