Closed andrewbwm closed 3 weeks ago
The attack graphs used by the simulator should be prune of nodes that are not viable since the attacker will never be able to take them and they just clog up the observation space.
A side issue that can be grouped under the same umbrella for the time being is compressing multiple attack steps into one when appropriate.
The attack graphs used by the simulator should be prune of nodes that are not viable since the attacker will never be able to take them and they just clog up the observation space.