“…We consider the following baseline configuration and train the model for different system vulnerability distributions: p d a = 0.2, p d u = 0.1, p n a = 0.8, q a = 0.9, q u = 0.1, C(0, 0) = 10, C(0, 1) = 15, C(1, 0) = 3, C(1, 1) = 0. To obtain the threshold policy [12], we consider the system vulnerability satisfies 0 ≤ p n u ≤ min{p n a , p n a − p d a + p d u }, i.e., p n u ∈ [0, 0.7]. Each p n u value represents one scenario θ = (p n u ) in our model.…”