Return to Article Details Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems Download Download PDF