smg
                    
            player att
              attacker1 ,
	[L_t2_RULE_12__local_DOS_t2_],
	[L_t6_RULE_15__local_exploit_t6_],
	[L_t8_RULE_15__local_exploit_t8_],
	[L_t10_RULE_16__remote_exploit_of_a_server_progt10_],
	[L_t12_RULE_19__multi_hop_access_t12_],
	[L_t14_RULE_19__multi_hop_access_t14_],
	[L_t15_RULE_19__multi_hop_access_t15_],
	[L_t18_RULE_9__Tampering_the_code_memory_t18_],
	[L_t20_RULE_22__Access_a_host_through_executingt20_],
	[L_t21_RULE_23__Access_a_host_through_a_log_in_t21_],
	[L_t23_RULE_19__multi_hop_access_t23_],
	[L_t25_RULE_19__multi_hop_access_t25_],
	[L_t26_RULE_19__multi_hop_access_t26_],
	[L_t28_RULE_19__multi_hop_access_t28_],
	[L_t31_RULE_9__Tampering_the_code_memory_t31_],
	[L_t33_RULE_22__Access_a_host_through_executingt33_],
	[L_t34_RULE_22__Access_a_host_through_executingt34_],
	[L_t36_RULE_16__remote_exploit_of_a_server_progt36_],
	[L_t38_RULE_19__multi_hop_access_t38_],
	[L_t40_RULE_19__multi_hop_access_t40_],
	[L_t41_RULE_19__multi_hop_access_t41_],
	[L_t43_RULE_19__multi_hop_access_t43_],
	[L_t45_RULE_19__multi_hop_access_t45_],
	[L_t48_RULE_23__Access_a_host_through_a_log_in_t48_],
	[L_t50_RULE_27__remote_ssh_to_a_host_t50_],
	[L_t53_RULE_9__Tampering_the_code_memory_t53_],
	[L_t55_RULE_19__multi_hop_access_t55_],
	[L_t56_RULE_20__direct_network_access_t56_],
	[L_t60_RULE_27__remote_ssh_to_a_host_t60_],
	[L_t64_RULE_19__multi_hop_access_t64_],
	[L_t66_RULE_19__multi_hop_access_t66_],
	[L_t67_RULE_20__direct_network_access_t67_],
	[L_t71_RULE_9__Tampering_the_code_memory_t71_],
	[L_t73_RULE_22__Access_a_host_through_executingt73_],
	[L_t74_RULE_22__Access_a_host_through_executingt74_],
	[L_t75_RULE_23__Access_a_host_through_a_log_in_t75_],
	[L_t77_RULE_27__remote_ssh_to_a_host_t77_],
	[L_t80_RULE_12__local_DOS_t80_],
	[L_t81_RULE_12__local_DOS_t81_],
	[L_t84_RULE_12__local_DOS_t84_]
            endplayer 
            
            player def
              defender ,
	[def_L_t8_RULE_15__local_exploit_t8_ ],
	[def_L_t10_RULE_16__remote_exploit_of_a_server_progt10_ ],
	[def_L_t12_RULE_19__multi_hop_access_t12_ ],
	[def_L_t18_RULE_9__Tampering_the_code_memory_t18_ ],
	[def_L_t21_RULE_23__Access_a_host_through_a_log_in_t21_ ],
	[def_L_t28_RULE_19__multi_hop_access_t28_ ],
	[def_L_t67_RULE_20__direct_network_access_t67_ ],
	[def_L_t75_RULE_23__Access_a_host_through_a_log_in_t75_ ]
            endplayer
            
                 global dos_plycent02_ : bool init false;
     global misuseAction_overusecpu_ : bool init true;
     global vulExists_plycent02__cve_2018_8897___cen : bool init true;
     global execCode_plycent02_root_ : bool init false;
     global vulExists_plycent02__cve_2017_9076___cen : bool init true;
     global execCode_plycent02_user_ : bool init false;
     global netAccess_plycent02_tcp_22_ : bool init false;
     global hacl_plycent02_plycent02_tcp_22_ : bool init true;
     global hacl_plycent03_plycent02_tcp_22_ : bool init true;
     global execCode_plycent03_root_ : bool init false;
     global canAccessHost_plycent03_ : bool init false;
     global netAccess_plycent03_tcp_22_ : bool init false;
     global hacl_plycent02_plycent03_tcp_22_ : bool init true;
     global hacl_plycent03_plycent03_tcp_22_ : bool init true;
     global hacl_plyrhel01_plycent03_tcp_22_ : bool init true;
     global execCode_plyrhel01_root_ : bool init false;
     global canAccessHost_plyrhel01_ : bool init false;
     global execCode_plyrhel01_user_ : bool init false;
     global netAccess_plyrhel01_tcp_22_ : bool init false;
     global hacl_plycent02_plyrhel01_tcp_22_ : bool init true;
     global hacl_plycent03_plyrhel01_tcp_22_ : bool init true;
     global hacl_plyrhel01_plyrhel01_tcp_22_ : bool init true;
     global networkServiceInfo_plyrhel01__redhatente : bool init true;
     global vulExists_plyrhel01__cve_2017_16997___re : bool init true;
     global logInService_plyrhel01_tcp_22_ : bool init false;
     global sshDaemon__redhatenterpriselinux7_5__ : bool init true;
     global vulExists_plyrhel01__cve_2018_3136___red : bool init true;
     global vulExists_plyrhel01__cve_2018_7566___red : bool init true;
     global hacl_internet_plycent03_tcp_22_ : bool init true;
     global attackerLocated_internet_ : bool init true;
     global logInService_plycent03_tcp_22_ : bool init false;
     global sshDaemon__centos7_5_1804__ : bool init true;
     global networkServiceInfo_plycent03__centos7_5_ : bool init true;
     global vulExists_plycent03__cve_2018_7566___cen : bool init true;
     global hacl_plyrhel01_plycent02_tcp_22_ : bool init true;
     global hacl_internet_plycent02_tcp_22_ : bool init true;
     global networkServiceInfo_plycent02__centos6_10 : bool init true;
     global vulExists_plycent02__cve_2018_1000004___ : bool init true;
     global canAccessHost_plycent02_ : bool init false;
     global logInService_plycent02_tcp_22_ : bool init false;
     global sshDaemon__centos6_10__ : bool init true;
     global vulExists_plycent02__cve_2018_7566___cen : bool init true;
     global misuseAction_overusememory_ : bool init true;

     global t : [1..3] init 1; // the players turn 

            
            module attacker1
            
	[L_t2_RULE_12__local_DOS_t2_] misuseAction_overusecpu_ &
			 vulExists_plycent02__cve_2018_8897___cen &
			 execCode_plycent02_root_ &
			 !dos_plycent02_ & !dos_plycent02_ & (t=1) -> 
				0.768: (dos_plycent02_' = true)   & (t'=1) +0.15466666666666665: (t'=1) +0.07733333333333332: (t'=3);

	[L_t6_RULE_15__local_exploit_t6_] execCode_plycent02_root_ &
			 vulExists_plycent02__cve_2017_9076___cen &
			 !execCode_plycent02_root_ & !dos_plycent02_ & (t=1) -> 
				0.8: (execCode_plycent02_root_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t8_RULE_15__local_exploit_t8_] vulExists_plycent02__cve_2017_9076___cen &
			 execCode_plycent02_user_ &
			 !execCode_plycent02_root_ & !dos_plycent02_ & (t=1) -> 
				0.8: (execCode_plycent02_root_' = true)   & (t'=2) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t10_RULE_16__remote_exploit_of_a_server_progt10_] netAccess_plycent02_tcp_22_ &
			 networkServiceInfo_plycent02__centos6_10 &
			 vulExists_plycent02__cve_2018_1000004___ &
			 !execCode_plycent02_user_ & !dos_plycent02_ & (t=1) -> 
				0.7985: (execCode_plycent02_user_' = true)   & (t'=2) +0.13433333333333333: (t'=1) +0.06716666666666667: (t'=3);

	[L_t12_RULE_19__multi_hop_access_t12_] execCode_plycent02_root_ &
			 hacl_plycent02_plycent02_tcp_22_ &
			 !netAccess_plycent02_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.768: (netAccess_plycent02_tcp_22_' = true)   & (t'=2) +0.15466666666666665: (t'=1) +0.07733333333333332: (t'=3);

	[L_t14_RULE_19__multi_hop_access_t14_] execCode_plycent02_user_ &
			 hacl_plycent02_plycent02_tcp_22_ &
			 !netAccess_plycent02_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plycent02_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t15_RULE_19__multi_hop_access_t15_] hacl_plycent03_plycent02_tcp_22_ &
			 execCode_plycent03_root_ &
			 !netAccess_plycent02_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plycent02_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t18_RULE_9__Tampering_the_code_memory_t18_] canAccessHost_plycent03_ &
			 vulExists_plycent03__cve_2018_7566___cen &
			 !execCode_plycent03_root_ & !dos_plycent02_ & (t=1) -> 
				0.512: (execCode_plycent03_root_' = true)   & (t'=2) +0.3253333333333333: (t'=1) +0.16266666666666665: (t'=3);

	[L_t20_RULE_22__Access_a_host_through_executingt20_] execCode_plycent03_root_ &
			 !canAccessHost_plycent03_ & !dos_plycent02_ & (t=1) -> 
				0.4096: (canAccessHost_plycent03_' = true)   & (t'=1) +0.3936: (t'=1) +0.1968: (t'=3);

	[L_t21_RULE_23__Access_a_host_through_a_log_in_t21_] netAccess_plycent03_tcp_22_ &
			 logInService_plycent03_tcp_22_ &
			 !canAccessHost_plycent03_ & !dos_plycent02_ & (t=1) -> 
				0.6399: (canAccessHost_plycent03_' = true)   & (t'=2) +0.24006666666666665: (t'=1) +0.12003333333333333: (t'=3);

	[L_t23_RULE_19__multi_hop_access_t23_] execCode_plycent02_root_ &
			 hacl_plycent02_plycent03_tcp_22_ &
			 !netAccess_plycent03_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plycent03_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t25_RULE_19__multi_hop_access_t25_] execCode_plycent02_user_ &
			 hacl_plycent02_plycent03_tcp_22_ &
			 !netAccess_plycent03_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plycent03_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t26_RULE_19__multi_hop_access_t26_] execCode_plycent03_root_ &
			 hacl_plycent03_plycent03_tcp_22_ &
			 !netAccess_plycent03_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plycent03_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t28_RULE_19__multi_hop_access_t28_] hacl_plyrhel01_plycent03_tcp_22_ &
			 execCode_plyrhel01_root_ &
			 !netAccess_plycent03_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.7219: (netAccess_plycent03_tcp_22_' = true)   & (t'=2) +0.1854: (t'=1) +0.0927: (t'=3);

	[L_t31_RULE_9__Tampering_the_code_memory_t31_] canAccessHost_plyrhel01_ &
			 vulExists_plyrhel01__cve_2018_3136___red &
			 !execCode_plyrhel01_root_ & !dos_plycent02_ & (t=1) -> 
				0.512: (execCode_plyrhel01_root_' = true)   & (t'=1) +0.3253333333333333: (t'=1) +0.16266666666666665: (t'=3);

	[L_t33_RULE_22__Access_a_host_through_executingt33_] execCode_plyrhel01_root_ &
			 !canAccessHost_plyrhel01_ & !dos_plycent02_ & (t=1) -> 
				0.7219: (canAccessHost_plyrhel01_' = true)   & (t'=1) +0.1854: (t'=1) +0.0927: (t'=3);

	[L_t34_RULE_22__Access_a_host_through_executingt34_] execCode_plyrhel01_user_ &
			 !canAccessHost_plyrhel01_ & !dos_plycent02_ & (t=1) -> 
				0.6398: (canAccessHost_plyrhel01_' = true)   & (t'=1) +0.2401333333333333: (t'=1) +0.12006666666666665: (t'=3);

	[L_t36_RULE_16__remote_exploit_of_a_server_progt36_] netAccess_plyrhel01_tcp_22_ &
			 networkServiceInfo_plyrhel01__redhatente &
			 vulExists_plyrhel01__cve_2017_16997___re &
			 !execCode_plyrhel01_user_ & !dos_plycent02_ & (t=1) -> 
				0.7997: (execCode_plyrhel01_user_' = true)   & (t'=1) +0.13353333333333336: (t'=1) +0.06676666666666668: (t'=3);

	[L_t38_RULE_19__multi_hop_access_t38_] execCode_plycent02_root_ &
			 hacl_plycent02_plyrhel01_tcp_22_ &
			 !netAccess_plyrhel01_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plyrhel01_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t40_RULE_19__multi_hop_access_t40_] execCode_plycent02_user_ &
			 hacl_plycent02_plyrhel01_tcp_22_ &
			 !netAccess_plyrhel01_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plyrhel01_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t41_RULE_19__multi_hop_access_t41_] execCode_plycent03_root_ &
			 hacl_plycent03_plyrhel01_tcp_22_ &
			 !netAccess_plyrhel01_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plyrhel01_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t43_RULE_19__multi_hop_access_t43_] execCode_plyrhel01_root_ &
			 hacl_plyrhel01_plyrhel01_tcp_22_ &
			 !netAccess_plyrhel01_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plyrhel01_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t45_RULE_19__multi_hop_access_t45_] execCode_plyrhel01_user_ &
			 hacl_plyrhel01_plyrhel01_tcp_22_ &
			 !netAccess_plyrhel01_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plyrhel01_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t48_RULE_23__Access_a_host_through_a_log_in_t48_] netAccess_plyrhel01_tcp_22_ &
			 logInService_plyrhel01_tcp_22_ &
			 !canAccessHost_plyrhel01_ & !dos_plycent02_ & (t=1) -> 
				0.64: (canAccessHost_plyrhel01_' = true)   & (t'=1) +0.24: (t'=1) +0.12: (t'=3);

	[L_t50_RULE_27__remote_ssh_to_a_host_t50_] networkServiceInfo_plyrhel01__redhatente &
			 sshDaemon__redhatenterpriselinux7_5__ &
			 !logInService_plyrhel01_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (logInService_plyrhel01_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t53_RULE_9__Tampering_the_code_memory_t53_] canAccessHost_plyrhel01_ &
			 vulExists_plyrhel01__cve_2018_7566___red &
			 !execCode_plyrhel01_root_ & !dos_plycent02_ & (t=1) -> 
				0.8: (execCode_plyrhel01_root_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t55_RULE_19__multi_hop_access_t55_] hacl_plyrhel01_plycent03_tcp_22_ &
			 execCode_plyrhel01_user_ &
			 !netAccess_plycent03_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plycent03_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t56_RULE_20__direct_network_access_t56_] hacl_internet_plycent03_tcp_22_ &
			 attackerLocated_internet_ &
			 !netAccess_plycent03_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plycent03_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t60_RULE_27__remote_ssh_to_a_host_t60_] sshDaemon__centos7_5_1804__ &
			 networkServiceInfo_plycent03__centos7_5_ &
			 !logInService_plycent03_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (logInService_plycent03_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t64_RULE_19__multi_hop_access_t64_] execCode_plyrhel01_root_ &
			 hacl_plyrhel01_plycent02_tcp_22_ &
			 !netAccess_plycent02_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.7219: (netAccess_plycent02_tcp_22_' = true)   & (t'=1) +0.1854: (t'=1) +0.0927: (t'=3);

	[L_t66_RULE_19__multi_hop_access_t66_] execCode_plyrhel01_user_ &
			 hacl_plyrhel01_plycent02_tcp_22_ &
			 !netAccess_plycent02_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plycent02_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t67_RULE_20__direct_network_access_t67_] attackerLocated_internet_ &
			 hacl_internet_plycent02_tcp_22_ &
			 !netAccess_plycent02_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (netAccess_plycent02_tcp_22_' = true)   & (t'=2) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t71_RULE_9__Tampering_the_code_memory_t71_] canAccessHost_plycent02_ &
			 vulExists_plycent02__cve_2018_7566___cen &
			 !execCode_plycent02_root_ & !dos_plycent02_ & (t=1) -> 
				0.511: (execCode_plycent02_root_' = true)   & (t'=1) +0.326: (t'=1) +0.163: (t'=3);

	[L_t73_RULE_22__Access_a_host_through_executingt73_] execCode_plycent02_root_ &
			 !canAccessHost_plycent02_ & !dos_plycent02_ & (t=1) -> 
				0.768: (canAccessHost_plycent02_' = true)   & (t'=1) +0.15466666666666665: (t'=1) +0.07733333333333332: (t'=3);

	[L_t74_RULE_22__Access_a_host_through_executingt74_] execCode_plycent02_user_ &
			 !canAccessHost_plycent02_ & !dos_plycent02_ & (t=1) -> 
				0.6388: (canAccessHost_plycent02_' = true)   & (t'=1) +0.2408: (t'=1) +0.1204: (t'=3);

	[L_t75_RULE_23__Access_a_host_through_a_log_in_t75_] netAccess_plycent02_tcp_22_ &
			 logInService_plycent02_tcp_22_ &
			 !canAccessHost_plycent02_ & !dos_plycent02_ & (t=1) -> 
				0.6388: (canAccessHost_plycent02_' = true)   & (t'=2) +0.2408: (t'=1) +0.1204: (t'=3);

	[L_t77_RULE_27__remote_ssh_to_a_host_t77_] networkServiceInfo_plycent02__centos6_10 &
			 sshDaemon__centos6_10__ &
			 !logInService_plycent02_tcp_22_ & !dos_plycent02_ & (t=1) -> 
				0.8: (logInService_plycent02_tcp_22_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t80_RULE_12__local_DOS_t80_] misuseAction_overusecpu_ &
			 vulExists_plycent02__cve_2018_8897___cen &
			 execCode_plycent02_user_ &
			 !dos_plycent02_ & !dos_plycent02_ & (t=1) -> 
				0.8: (dos_plycent02_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t81_RULE_12__local_DOS_t81_] execCode_plycent02_root_ &
			 misuseAction_overusememory_ &
			 vulExists_plycent02__cve_2017_9076___cen &
			 !dos_plycent02_ & !dos_plycent02_ & (t=1) -> 
				0.8: (dos_plycent02_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

	[L_t84_RULE_12__local_DOS_t84_] execCode_plycent02_user_ &
			 misuseAction_overusememory_ &
			 vulExists_plycent02__cve_2017_9076___cen &
			 !dos_plycent02_ & !dos_plycent02_ & (t=1) -> 
				0.8: (dos_plycent02_' = true)   & (t'=1) +0.1333333333333333: (t'=1) +0.06666666666666665: (t'=3);

            endmodule
            
            
            
            module defender
            
            	[def_L_t8_RULE_15__local_exploit_t8_ ] execCode_plycent02_root_ & (t=2) -> 
			 0.6: (misuseAction_overusecpu_' = false) & (vulExists_plycent02__cve_2018_8897___cen' = false) & (t'=1)  + 0.4: (t'=1);
	[def_L_t10_RULE_16__remote_exploit_of_a_server_progt10_ ] execCode_plycent02_user_ & (t=2) -> 
			 0.6: (misuseAction_overusememory_' = false) & (vulExists_plycent02__cve_2017_9076___cen' = false) & (t'=1)  + 0.4: (t'=1);
	[def_L_t12_RULE_19__multi_hop_access_t12_ ] netAccess_plycent02_tcp_22_ & (t=2) -> 
			 0.6: (networkServiceInfo_plycent02__centos6_10' = false) & (vulExists_plycent02__cve_2018_1000004___' = false) & (t'=1)  + 0.4: (t'=1);
	[def_L_t18_RULE_9__Tampering_the_code_memory_t18_ ] execCode_plycent03_root_ & (t=2) -> 
			 0.6: (vulExists_plycent02__cve_2017_9076___cen' = false) & (t'=1)  + 0.4: (t'=1);
	[def_L_t21_RULE_23__Access_a_host_through_a_log_in_t21_ ] canAccessHost_plycent03_ & (t=2) -> 
			 0.6: (vulExists_plycent02__cve_2017_9076___cen' = false) & (t'=1)  + 0.4: (t'=1);
	[def_L_t28_RULE_19__multi_hop_access_t28_ ] netAccess_plycent03_tcp_22_ & (t=2) -> 
			 0.6: (networkServiceInfo_plycent02__centos6_10' = false) & (vulExists_plycent02__cve_2018_1000004___' = false) & (t'=1)  + 0.4: (t'=1);
	[def_L_t67_RULE_20__direct_network_access_t67_ ] netAccess_plycent02_tcp_22_ & (t=2) -> 
			 0.6: (misuseAction_overusememory_' = false) & (vulExists_plycent02__cve_2017_9076___cen' = false) & (t'=1)  + 0.4: (t'=1);
	[def_L_t75_RULE_23__Access_a_host_through_a_log_in_t75_ ] canAccessHost_plycent02_ & (t=2) -> 
			 0.6: (networkServiceInfo_plycent02__centos6_10' = false) & (vulExists_plycent02__cve_2018_1000004___' = false) & (t'=1)  + 0.4: (t'=1);

 endmodule