Author:
Tang Yunlong,Sun Jing,Wang Huan,Deng Junyi,Tong Liang,Xu Wenhong
Reference52 articles.
1. Cyber-security and reinforcement learning—A brief survey;Adawadkar;Eng. Appl. Artif. Intell.,2022
2. Adaptive cyber defense technique based on multiagent reinforcement learning strategies;Alshamrani;Intell. Autom. Soft Comput.,2023
3. Optimizing vulnerability-driven honey traffic using game theory;Anjum,2020
4. Applebaum, A., Dennler, C., Dwyer, P., Moskowitz, M., Nguyen, H., Nichols, N., Park, N., Rachwalski, P., Rau, F., Webster, A., et al., 2022. Bridging automated to autonomous cyber defense: Foundational analysis of tabular q-learning. In: Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security. pp. 149–159.
5. Deep reinforcement adversarial learning against botnet evasion attacks;Apruzzese;IEEE Trans. Netw. Serv. Manag.,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献