Author:
Aggarwal Palvi,Maqbool Zahid,Grover Antra,Pammi V. S. Chandrasekhar,Singh Saumya,Dutt Varun
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Learning about simulated adversaries from human defenders using interactive cyber-defense games;Journal of Cybersecurity;2023-01-01
2. Optimal strategy selection for attack graph games using deep reinforcement learning;2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2022-12
3. Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning;2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta);2022-12
4. Reinforcement Learning's Contribution to the Cyber Security of Distributed Systems;Research Anthology on Convergence of Blockchain, Internet of Things, and Security;2022-07-08
5. HackIT: A Human-in-the-Loop Simulation Tool for Realistic Cyber Deception Experiments;Advances in Intelligent Systems and Computing;2019-06-06