mal-lang / mal-simulator

Apache License 2.0
2 stars 1 forks source link

Prune the Attack Graphs Used #9

Closed andrewbwm closed 3 weeks ago

andrewbwm commented 6 months ago

The attack graphs used by the simulator should be prune of nodes that are not viable since the attacker will never be able to take them and they just clog up the observation space.

andrewbwm commented 4 months ago

A side issue that can be grouped under the same umbrella for the time being is compressing multiple attack steps into one when appropriate.