暂无分享,去创建一个
[1] Changjun Jiang,et al. DDoS Mitigation Based on Space-Time Flow Regularities in IoV: A Feature Adaption Reinforcement Learning Approach , 2022, IEEE Transactions on Intelligent Transportation Systems.
[2] Quanyan Zhu,et al. RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks , 2021, Comput. Secur..
[3] Quanyan Zhu,et al. Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals , 2021, Game Theory and Machine Learning for Cyber Security.
[4] Quanyan Zhu,et al. Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability , 2021, GameSec.
[5] Furong Huang,et al. Who Is the Strongest Enemy? Towards Optimal and Efficient Evasion Attacks in Deep RL , 2021, ICLR.
[6] David M. Nicol,et al. The Ransomware Threat to Energy-Delivery Systems , 2021, IEEE Security & Privacy.
[7] Faruk Kazi,et al. An adaptive honeypot using Q-Learning with severity analyzer , 2021, Journal of Ambient Intelligence and Humanized Computing.
[8] Zhiqin Zhu,et al. Power system structure optimization based on reinforcement learning and sparse constraints under DoS attacks in cloud environments , 2021, Simul. Model. Pract. Theory.
[9] I. Linkov,et al. Cyber Resilience of Systems and Networks , 2021 .
[10] Quanyan Zhu,et al. Convergence of Bayesian Nash Equilibrium in Infinite Bayesian Games under Discretization , 2021, ArXiv.
[11] Danda B. Rawat,et al. Reinforcement Learning for IoT Security: A Comprehensive Survey , 2021, IEEE Internet of Things Journal.
[12] Rub'en Majadas,et al. Disturbing Reinforcement Learning Agents with Corrupted Rewards , 2021, ArXiv.
[13] Tim Miller,et al. Deceptive Reinforcement Learning for Privacy-Preserving Planning , 2021, AAMAS.
[14] Chungang Gao,et al. Reinforcement learning based self-adaptive moving target defense against DDoS attacks , 2021, Journal of Physics: Conference Series.
[15] SolarWinds hack will alter US cyber strategy , 2021, Emerald Expert Briefings.
[16] Sunder Ali Khowaja,et al. Q-learning and LSTM based deep active learning strategy for malware defense in industrial IoT applications , 2021, Multimedia Tools and Applications.
[17] Yishay Mansour,et al. Learning Adversarial Markov Decision Processes with Delayed Feedback , 2020, AAAI.
[18] Quanyan Zhu,et al. Cross-Layer Coordinated Attacks on Cyber-Physical Systems: A LQG Game Framework with Controlled Observations , 2020, 2021 European Control Conference (ECC).
[19] Thiagarajan Ramachandran,et al. Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning , 2020, 2020 IEEE International Conference on Intelligence and Security Informatics (ISI).
[20] C. Pal,et al. Reinforcement Learning with Random Delays , 2020, ICLR.
[21] Guanghui Wen,et al. Distributed Reinforcement Learning for Cyber-Physical System With Multiple Remote State Estimation Under DoS Attacker , 2020, IEEE Transactions on Network Science and Engineering.
[22] Shiqi Wang,et al. DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing , 2020, IEEE Transactions on Information Forensics and Security.
[23] Furong Huang,et al. Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics , 2020, ICLR.
[24] Quanyan Zhu,et al. Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants , 2020, Reliab. Eng. Syst. Saf..
[25] Doina Precup,et al. Fast reinforcement learning with generalized policy updates , 2020, Proceedings of the National Academy of Sciences.
[26] Quanyan Zhu,et al. Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots , 2020, GameSec.
[27] Sailik Sengupta,et al. Multi-agent Reinforcement Learning in Bayesian Stackelberg Markov Games for Adaptive Moving Target Defense , 2020, ArXiv.
[28] Mohan Li,et al. Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.
[29] Yuan Zhao,et al. DQ-MOTAG: Deep Reinforcement Learning-based Moving Target Defense Against DDoS Attacks , 2020, 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC).
[30] Quanyan Zhu,et al. Duplicity Games for Deception Design With an Application to Insider Threat Mitigation , 2020, IEEE Transactions on Information Forensics and Security.
[31] Quanyan Zhu,et al. Game of Duplicity: A Proactive Automated Defense Mechanism by Deception Design , 2020, ArXiv.
[32] Chuadhry Mujeeb Ahmed,et al. DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).
[33] Jun Li,et al. Application-Layer DDoS Defense with Reinforcement Learning , 2020, 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS).
[34] Divyashikha Sethia,et al. Q-Bully: A Reinforcement Learning based Cyberbullying Detection Framework , 2020, 2020 International Conference for Emerging Technology (INCET).
[35] Xiaojin Zhu,et al. Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning , 2020, ICML.
[36] A. Singla,et al. Adaptive Reward-Poisoning Attacks against Reinforcement Learning , 2020, ICML.
[37] Manuel López Martín,et al. Application of deep reinforcement learning to intrusion detection for supervised problems , 2020, Expert Syst. Appl..
[38] Zengguang Liu,et al. CPSS LR-DDoS Detection and Defense in Edge Computing Utilizing DCNN Q-Learning , 2020, IEEE Access.
[39] Quanyan Zhu,et al. Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals , 2020, ArXiv.
[40] Quanyan Zhu. Control Challenges for Resilient Control Systems , 2020, ArXiv.
[41] Quanyan Zhu,et al. $\mathtt{FlipIn}$ : A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things , 2019, IEEE Transactions on Information Forensics and Security.
[42] Hui Xiong,et al. A Comprehensive Survey on Transfer Learning , 2019, Proceedings of the IEEE.
[43] Quanyan Zhu,et al. Dynamic games for secure and resilient control system design , 2019, National science review.
[44] Xiaojin Zhu,et al. Policy Poisoning in Batch Reinforcement Learning and Control , 2019, NeurIPS.
[45] Quanyan Zhu,et al. On Convergence Rate of Adaptive Multiscale Value Function Approximation for Reinforcement Learning , 2019, 2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP).
[46] Ion Bica,et al. On the rewards of self-adaptive IoT honeypots , 2019, Ann. des Télécommunications.
[47] Quanyan Zhu,et al. Continuous-Time Markov Decision Processes with Controlled Observations , 2019, 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[48] Quanyan Zhu,et al. A Dynamic Game Framework for Rational and Persistent Robot Deception With an Application to Deceptive Pursuit-Evasion , 2019, IEEE Transactions on Automation Science and Engineering.
[49] Moitrayee Chatterjee,et al. Detecting Phishing Websites through Deep Reinforcement Learning , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).
[50] Wei Ren,et al. On the Control of Multi-Agent Systems: A Survey , 2019, Found. Trends Syst. Control..
[51] Rashmi Ranjan Rout,et al. Deep Q-Learning and Particle Swarm Optimization for Bot Detection in Online Social Networks , 2019, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[52] Quanyan Zhu,et al. Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes , 2019, GameSec.
[53] Quanyan Zhu,et al. A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..
[54] Quanyan Zhu,et al. Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals , 2019, GameSec.
[55] Guang-Hong Yang,et al. LQ Secure Control for Cyber-Physical Systems Against Sparse Sensor and Actuator Attacks , 2019, IEEE Transactions on Control of Network Systems.
[56] Martin Mullins,et al. Connected and autonomous vehicles: A cyber-risk classification framework , 2019, Transportation Research Part A: Policy and Practice.
[57] Quanyan Zhu,et al. A Differential Game Approach to Decentralized Virus-Resistant Weight Adaptation Policy Over Complex Networks , 2019, IEEE Transactions on Control of Network Systems.
[58] Naima Kaabouch,et al. Social Engineering Attacks: A Survey , 2019, Future Internet.
[59] Junfeng Wang,et al. Evading Anti-Malware Engines With Deep Reinforcement Learning , 2019, IEEE Access.
[60] Ying Chen,et al. Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control , 2019, IEEE Transactions on Smart Grid.
[61] Zhen Ni,et al. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[62] Peter Henderson,et al. An Introduction to Deep Reinforcement Learning , 2018, Found. Trends Mach. Learn..
[63] Tao Jiang,et al. Deep Reinforcement Learning for Mobile Edge Caching: Review, New Features, and Open Issues , 2018, IEEE Network.
[64] Sachin Shetty,et al. Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights , 2018, 2018 IEEE International Conference on Intelligence and Security Informatics (ISI).
[65] Shan Liu,et al. Event-triggered resilient control for cyber-physical system under denial-of-service attacks , 2018, Int. J. Control.
[66] Bo Li,et al. Reinforcement Learning with Perturbed Rewards , 2018, AAAI.
[67] Chong Li,et al. Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach , 2018, IEEE Transactions on Smart Grid.
[68] Enda Barrett,et al. Using Reinforcement Learning to Conceal Honeypot Functionality , 2018, ECML/PKDD.
[69] Quanyan Zhu,et al. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.
[70] Quanyan Zhu,et al. DISTRIBUTED AND OPTIMAL RESILIENT PLANNING OF LARGE-SCALE INTERDEPENDENT CRITICAL INFRASTRUCTURES , 2018, 2018 Winter Simulation Conference (WSC).
[71] Jürgen Schmidhuber,et al. Recurrent World Models Facilitate Policy Evolution , 2018, NeurIPS.
[72] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[73] Jianhua Li,et al. Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[74] Nicola Bezzo,et al. An IRL Approach for Cyber-Physical Attack Intention Prediction and Recovery , 2018, 2018 Annual American Control Conference (ACC).
[75] Arslan Munir,et al. Adversarial Reinforcement Learning Framework for Benchmarking Collision Avoidance Mechanisms in Autonomous Vehicles , 2018, IEEE Intelligent Transportation Systems Magazine.
[76] Liang Xiao,et al. DQN-Based Power Control for IoT Transmission against Jamming , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
[77] Mugen Peng,et al. Learning-Based Defense against Malicious Unmanned Aerial Vehicles , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
[78] Igor Linkov,et al. Fundamental Concepts of Cyber Resilience: Introduction and Overview , 2018, Cyber Resilience of Systems and Networks.
[79] Walid Saad,et al. Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).
[80] Jianye Hao,et al. Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning , 2018, IEEE Transactions on Software Engineering.
[81] M. Schukat,et al. Improving adaptive honeypot functionality with efficient reinforcement learning parameters for automated malware , 2018, Journal of Cyber Security Technology.
[82] Xin Huang,et al. Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks , 2018, IEEE Transactions on Cybernetics.
[83] Nauman Aslam,et al. Detection of online phishing email using dynamic evolving neural network based on reinforcement learning , 2018, Decis. Support Syst..
[84] Xiang Chen,et al. Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.
[85] Quanyan Zhu,et al. A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..
[86] Xiaojiang Du,et al. Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[87] Hao Xu,et al. Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).
[88] Sushil Jajodia,et al. Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning , 2017, MTD@CCS.
[89] Quanyan Zhu,et al. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.
[90] Sergey Levine,et al. Neural Network Dynamics for Model-Based Deep Reinforcement Learning with Model-Free Fine-Tuning , 2017, 2018 IEEE International Conference on Robotics and Automation (ICRA).
[91] Razvan Pascanu,et al. Imagination-Augmented Agents for Deep Reinforcement Learning , 2017, NIPS.
[92] Benjamin Van Roy,et al. A Tutorial on Thompson Sampling , 2017, Found. Trends Mach. Learn..
[93] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[94] Quanyan Zhu,et al. A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.
[95] Quanyan Zhu,et al. A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.
[96] H. Vincent Poor,et al. Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[97] Liang Xiao,et al. Active authentication with reinforcement learning based on ambient radio signals , 2017, Multimedia Tools and Applications.
[98] Rick S. Blum,et al. GPS spoofing attack characterization and detection in smart grids , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[99] Sudharman K. Jayaweera,et al. Reinforcement learning based anti-jamming with wideband autonomous cognitive radios , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
[100] David Last,et al. Forecasting Zero-Day Vulnerabilities , 2016, CISRC.
[101] Jiming Chen,et al. Cyber Security for Industrial Control Systems : From the Viewpoint of Close-Loop , 2016 .
[102] Pietro Tesi,et al. Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).
[103] Alex Graves,et al. Asynchronous Methods for Deep Reinforcement Learning , 2016, ICML.
[104] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[105] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
[106] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[107] Quanyan Zhu,et al. Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.
[108] Quanyan Zhu,et al. Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games , 2015, MIST@CCS.
[109] Joseph D. Prusa,et al. Survey of review spam detection using machine learning techniques , 2015, Journal of Big Data.
[110] Joel J. P. C. Rodrigues,et al. On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).
[111] Daniel Kudenko,et al. Distributed response to network intrusions using multiagent reinforcement learning , 2015, Eng. Appl. Artif. Intell..
[112] Sergey Levine,et al. Trust Region Policy Optimization , 2015, ICML.
[113] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[114] Weihua Zhuang,et al. Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[115] Guy Lever,et al. Deterministic Policy Gradient Algorithms , 2014, ICML.
[116] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[117] Quanyan Zhu,et al. Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[118] Bogdan Gabrys,et al. Metalearning: a survey of trends and technologies , 2013, Artificial Intelligence Review.
[119] Daniel Kudenko,et al. Multiagent Router Throttling: Decentralized Coordinated Response Against DDoS Attacks , 2013, IAAI.
[120] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[121] Quanyan Zhu,et al. Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.
[122] Eric Cole,et al. Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization , 2012 .
[123] Quanyan Zhu,et al. Deceptive Routing in Relay Networks , 2012, GameSec.
[124] Quanyan Zhu,et al. Interference Aware Routing Game for Cognitive Radio Multi-Hop Networks , 2012, IEEE Journal on Selected Areas in Communications.
[125] Quanyan Zhu,et al. A game-theoretic framework for control of distributed renewable-based energy resources in smart grids , 2012, 2012 American Control Conference (ACC).
[126] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[127] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[128] Quanyan Zhu,et al. Dynamic Secure Routing Game in Distributed Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[129] Walid Saad,et al. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[130] Radu State,et al. Adaptive and self-configurable honeypots , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[131] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[132] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[133] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[134] Quanyan Zhu,et al. Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[135] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[136] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[137] Jing Wu,et al. Design of Networked Control Systems With Packet Dropouts , 2007, IEEE Transactions on Automatic Control.
[138] Xin Xu,et al. Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.
[139] Jose J. Gonzalez,et al. A Framework for Conceptualizing Social Engineering Attacks , 2006, CRITIS.
[140] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[141] Sigurd Skogestad,et al. Control structure design for complete chemical plants , 2004, Comput. Chem. Eng..
[142] Konstantinos V. Katsikopoulos,et al. Markov decision processes with delays and asynchronous cost collection , 2003, IEEE Trans. Autom. Control..
[143] Ricardo Vilalta,et al. A Perspective View and Survey of Meta-Learning , 2002, Artificial Intelligence Review.
[144] Yishay Mansour,et al. Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.
[145] T. Tsubone,et al. Stabilizing and destabilizing control for a piecewise-linear circuit , 1998 .
[146] Karl Johan Åström,et al. Theory and applications of adaptive control - A survey , 1983, Autom..
[147] Quanyan Zhu,et al. INADVERT: An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention , 2021, ArXiv.
[148] Zinovi Rabinovich,et al. Transferable Environment Poisoning: Training-time Attack on Reinforcement Learning , 2021, AAMAS.
[149] Szu-Hao Huang,et al. Adversarial Attacks Against Reinforcement Learning-Based Portfolio Management Strategy , 2021, IEEE Access.
[150] Dong Seong Kim,et al. DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework , 2021, IEEE Access.
[151] Sushil Jajodia,et al. Adaptive Autonomous Secure Cyber Systems , 2020 .
[152] Guangming Tang,et al. An Intelligent Deployment Policy for Deception Resources Based on Reinforcement Learning , 2020, IEEE Access.
[153] Quanyan Zhu,et al. Cross-Layer Framework for CPSs , 2020 .
[154] Yevgeniy Vorobeychik,et al. Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense , 2020, GameSec.
[155] Industrial Control Systems Security and Resiliency: Practice and Theory , 2019, Advances in Information Security.
[156] Quanyan Zhu,et al. A game theoretic approach for responding to cyber-attacks on nuclear power plants , 2019 .
[157] Ion Bica,et al. QRASSH - A Self-Adaptive SSH Honeypot Driven by Q-Learning , 2018, 2018 International Conference on Communications (COMM).
[158] Grace Hui Yang,et al. Use of Interpersonal Deception Theory in Counter Social Engineering , 2018, CIKM Workshops.
[159] Juliane Junker,et al. Lyapunov Based Control Of Mechanical Systems , 2016 .
[160] Quanyan Zhu,et al. Hierarchical architectures of resilient control systems: Concepts, metrics and design principles , 2015 .
[161] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[162] Dimitri P. Bertsekas,et al. Neuro-Dynamic Programming , 2009, Encyclopedia of Optimization.
[163] Dawn M. Cappelli,et al. Combating the Insider Cyber Threat , 2008, IEEE Security & Privacy.
[164] Lubomír Bakule,et al. Decentralized control: An overview , 2008, Annu. Rev. Control..
[165] J. P. Gupta,et al. Securing oil and gas infrastructure , 2007 .
[166] Daniel Kudenko,et al. Multi-agent Reinforcement Learning for Intrusion Detection , 2007, Adaptive Agents and Multi-Agents Systems.
[167] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[168] Neal Krawetz,et al. Anti-honeypot technology , 2004, IEEE Security & Privacy Magazine.
[169] Michael O. Duff,et al. Reinforcement Learning Methods for Continuous-Time Markov Decision Problems , 1994, NIPS.
[170] Gavriel Salomon,et al. T RANSFER OF LEARNING , 1992 .
[171] Donald E. Kirk,et al. Optimal control theory : an introduction , 1970 .