Author:
Merzouk Mohamed Amine,Neal Christopher,Delas Joséphine,Yaich Reda,Boulahia-Cuppens Nora,Cuppens Frédéric
Publisher
Springer Science and Business Media LLC
Reference70 articles.
1. Abou El Houda, Z., Moudoud, H., Brik, B.: Federated deep reinforcement learning for efficient jamming attack mitigation in o-ran. In: IEEE Transactions on Vehicular Technology (2024)
2. Ajay, J.: Why Cybersecurity Should Be Top Of Mind In 2023 (2023). https://www.forbes.com/sites/forbestechcouncil/2023/01/06/why-cybersecurity-should-be-top-of-mind-in-2023/?sh=1654d131235c
3. Annachhatre, C., Austin, T.H., Stamp, M.: Hidden Markov models for malware classification. J. Comput. Virol. Hack. Tech. 11, 59–73 (2015)
4. Bajaj, K., Arora, A.: Improving the intrusion detection using discriminative machine learning approach and improve the time complexity by data mining feature selection methods. Int. J. Comput. Appl. 76(1), 5–11 (2013)
5. Behzadan, V., Munir, A.: Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks. In: Machine Learning and Data Mining in Pattern Recognition (2017)