Adversarial environment reinforcement learning algorithm for intrusion detection
暂无分享,去创建一个
[1] Xin Wang,et al. Machine Learning for Networking: Workflow, Advances and Opportunities , 2017, IEEE Network.
[2] S. M. Kovalev,et al. Advanced Temporal-Difference Learning for Intrusion Detection , 2015 .
[3] Zhi-Hua Zhou,et al. Ensemble Methods: Foundations and Algorithms , 2012 .
[4] Lambert Schomaker,et al. Reinforcement learning algorithms for solving classification problems , 2011, 2011 IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning (ADPRL).
[5] Haibo He,et al. ADASYN: Adaptive synthetic sampling approach for imbalanced learning , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[6] Joel J. P. C. Rodrigues,et al. Enabling Technologies for the Internet of Health Things , 2018, IEEE Access.
[7] Zhisheng Hu,et al. Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed , 2014, MTD '14.
[8] Bart De Schutter,et al. Multi-agent Reinforcement Learning: An Overview , 2010 .
[9] Raimir Holanda Filho,et al. Intelligent Network Security Monitoring Based on Optimum-Path Forest Clustering , 2019, IEEE Network.
[10] Jaime Lloret,et al. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT , 2017, Sensors.
[11] Chai Quek,et al. Pattern classification using fuzzy adaptive learning control network and reinforcement learning , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..
[12] Manuel Lopez-Martin,et al. Variational data generative model for intrusion detection , 2018, Knowledge and Information Systems.
[13] João Paulo Papa,et al. Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.
[14] Anamika Yadav,et al. Performance analysis of NSL-KDD dataset using ANN , 2015, 2015 International Conference on Signal Processing and Communication Engineering Systems.
[15] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[16] Kleanthis Malialis,et al. Distributed reinforcement learning for network intrusion response , 2014 .
[17] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[18] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[19] Xin Xu,et al. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
[20] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[21] Yasmen Wahba,et al. Improving the Performance of Multi-class Intrusion Detection Systems using Feature Reduction , 2015, ArXiv.
[22] Robert Babuska,et al. A Survey of Actor-Critic Reinforcement Learning: Standard and Natural Policy Gradients , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[23] Joel J. P. C. Rodrigues,et al. Enabling Technologies on Cloud of Things for Smart Healthcare , 2018, IEEE Access.
[24] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.
[25] Marc Peter Deisenroth,et al. Deep Reinforcement Learning: A Brief Survey , 2017, IEEE Signal Processing Magazine.
[26] Richard S. Sutton,et al. Learning to predict by the methods of temporal differences , 1988, Machine Learning.
[27] Daniel Kudenko,et al. Multi-agent Reinforcement Learning for Intrusion Detection , 2007, Adaptive Agents and Multi-Agents Systems.
[28] Michail G. Lagoudakis,et al. Reinforcement Learning as Classification: Leveraging Modern Classifiers , 2003, ICML.