Reinforcement Learning for Attack Mitigation in SDN-enabled Networks
暂无分享,去创建一个
[1] Xin Xu. Adaptive Intrusion Detection Based on Machine Learning : Feature Extraction , Classifier Construction and Sequential Pattern Prediction , 2006 .
[2] Srinivasan Seshan,et al. PSI: Precise Security Instrumentation for Enterprise Networks , 2017, NDSS.
[3] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[4] Tom Schaul,et al. Rainbow: Combining Improvements in Deep Reinforcement Learning , 2017, AAAI.
[5] Ian F. Akyildiz,et al. QoS-Aware Adaptive Routing in Multi-layer Hierarchical Software Defined Networks: A Reinforcement Learning Approach , 2016, 2016 IEEE International Conference on Services Computing (SCC).
[6] Alec Radford,et al. Proximal Policy Optimization Algorithms , 2017, ArXiv.
[7] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[8] Tongbo Luo,et al. IoTCandyJar : Towards an Intelligent-Interaction Honeypot for IoT Devices , 2017 .
[9] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[10] Mohamed Cheriet,et al. Dynamic Optimal Countermeasure Selection for Intrusion Response System , 2018, IEEE Transactions on Dependable and Secure Computing.
[11] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[12] Minlan Yu,et al. Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags , 2014, NSDI.
[13] Xin Xu. Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction , 2006 .
[14] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[15] Yuval Tassa,et al. Data-efficient Deep Reinforcement Learning for Dexterous Manipulation , 2017, ArXiv.
[16] Daniel Kudenko,et al. Multi-agent Reinforcement Learning for Intrusion Detection , 2007, Adaptive Agents and Multi-Agents Systems.
[17] Félix J. García Clemente,et al. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.
[18] Ning Zhang,et al. Efficient Signature Generation for Classifying Cross-Architecture IoT Malware , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).
[19] Sergey Levine,et al. Soft Actor-Critic: Off-Policy Maximum Entropy Deep Reinforcement Learning with a Stochastic Actor , 2018, ICML.
[20] Tsuyoshi Murata,et al. {m , 1934, ACML.
[21] Timo Hämäläinen,et al. Growing Hierarchical Self-organising Maps for Online Anomaly Detection by using Network Logs , 2012, WEBIST.