“…For the attacker, whether his/her type is H, M, or L, he/she can take one of the I, A, or D actions. If we denote (X, Y, Z) the strategy that type-H attacker plays X, type-M attacker plays Y while type-L attacker plays Z, then there would be 3 3 = 27 pure strategies [26] for σ. For the ICPS defender, we let (X, Y, Z) represent the strategy for the ICPS defender to play X, Y , and Z under the information sets H, F, and N, respectively.…”