暂无分享,去创建一个
[1] Vijay Janapa Reddi,et al. Deep Reinforcement Learning for Cyber Security , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[2] Zhisheng Hu,et al. Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs , 2017, MTD@CCS.
[3] Weiming Zhang,et al. Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[4] Cesare Tinelli,et al. Satisfiability Modulo Theories , 2021, Handbook of Satisfiability.
[5] Antonio Pietrabissa,et al. A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning , 2018, 2018 26th Mediterranean Conference on Control and Automation (MED).
[6] Alec Radford,et al. Proximal Policy Optimization Algorithms , 2017, ArXiv.
[7] Paul Grünbacher,et al. A Constraint Mining Approach to Support Monitoring Cyber-Physical Systems , 2019, CAiSE.
[8] Naima Kaabouch,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[9] Demosthenis Teneketzis,et al. A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks , 2018, IEEE Transactions on Information Forensics and Security.
[10] Shaolei Ren,et al. Game Theory for Cyber Security and Privacy , 2017, ACM Comput. Surv..