Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions
暂无分享,去创建一个
Sushil Jajodia | Ankit Shah | Hasan Çam | Rajesh Ganesan | S. Jajodia | Ankit Shah | H. Çam | R. Ganesan
[1] Richard S. Sutton,et al. Introduction to Reinforcement Learning , 1998 .
[2] Mark P. Van Oyen,et al. Design and Analysis of Hospital Admission Control for Operational Effectiveness , 2011 .
[3] Panos M. Pardalos,et al. Approximate dynamic programming: solving the curses of dimensionality , 2009, Optim. Methods Softw..
[4] John McHugh,et al. Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations , 2016, SOUPS.
[5] Kasia Muldner,et al. Toward understanding distributed cognition in IT security management: the role of cues and norms , 2011, Cognition, Technology & Work.
[6] A. N. Zincir-Heywood,et al. Intrusion Detection Systems , 2008 .
[7] Martin L. Puterman,et al. Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .
[8] Kasia Muldner,et al. Preparation, detection, and analysis: the diagnostic work of IT security incident response , 2010, Inf. Manag. Comput. Secur..
[9] Dimitri P. Bertsekas,et al. Reinforcement Learning for Dynamic Channel Allocation in Cellular Telephone Systems , 1996, NIPS.
[10] Sushil Jajodia,et al. Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk , 2017, ACM Trans. Intell. Syst. Technol..
[11] Mehmet Emin Aydin,et al. Dynamic job-shop scheduling using reinforcement learning agents , 2000, Robotics Auton. Syst..
[12] Sushil Jajodia,et al. A methodology to measure and monitor level of operational effectiveness of a CSOC , 2017, International Journal of Information Security.
[13] Tudor Dumitras,et al. The Global Cyber-Vulnerability Report , 2015, Terrorism, Security, and Computation.
[14] Sushil Jajodia,et al. Applications of Data Mining in Computer Security , 2002, Advances in Information Security.
[15] Sushil Jajodia,et al. Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning , 2016, ACM Trans. Intell. Syst. Technol..
[16] Benjamin Edwards,et al. Hype and Heavy Tails: A Closer Look at Data Breaches , 2016, WEIS.
[17] Daniel P. Heyman,et al. Stochastic processes and operating characteristics , 2004 .
[18] U. Rieder,et al. Markov Decision Processes , 2010 .
[19] Pieter Vansteenwegen,et al. Decreasing the passenger waiting time for an intercity rail network , 2007 .
[20] Abhijit Gosavi,et al. Simulation-Based Optimization: Parametric Optimization Techniques and Reinforcement Learning , 2003 .
[21] Pratyusa K. Manadhata,et al. The Operational Role of Security Information and Event Management Systems , 2014, IEEE Security & Privacy.
[22] Warren B. Powell,et al. Approximate Dynamic Programming: Solving the Curses of Dimensionality (Wiley Series in Probability and Statistics) , 2007 .
[23] Sean R Eddy,et al. What is dynamic programming? , 2004, Nature Biotechnology.
[24] J. Pearson. Linear multivariable control, a geometric approach , 1977 .
[25] Warren B. Powell,et al. Approximate Dynamic Programming - Solving the Curses of Dimensionality , 2007 .
[26] Reeshad S. Dalal,et al. Psychosocial Dynamics of Cyber Security , 2016 .
[27] Marie-Elisabeth Paté-Cornell,et al. Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach , 2017, Singapore Cyber-Security Conference.
[28] Roberto Di Pietro,et al. Intrusion Detection Systems , 2008 .